PRI Technology
Key Responsibilities
Lead and mentor a team of threat intelligence analysts and security testing professionals, fostering a culture of curiosity, rigor, and continuous improvement.
Develop and execute strategies for threat intelligence gathering and security testing aligned with organizational risk management goals.
Set performance goals, conduct regular reviews, and provide feedback and development plans for team members.
Serve as the primary point of contact for threat intelligence and testing matters, communicating findings and recommendations to executive leadership and other stakeholders.
Manage budgets for tools, training, and resources related to threat intelligence and testing operations. Technical
Oversee the collection, analysis, and dissemination of tactical, operational, and strategic threat intelligence.
Maintain and evolve the threat intelligence platform (e.g., Anomali, MISP, TIP integrations).
Enrich detection and response efforts through intelligence‑led insights.
Lead internal and external penetration testing, purple team engagements, and threat emulation exercises.
Drive continuous control validation initiatives (e.g., MITRE ATT&CK alignment, breach simulation).
Collaborate with detection engineers and SOC to convert threat intel into actionable detections.
Guide hypothesis‑driven threat hunts based on current intelligence and adversary behaviors.
Maintain a technical understanding of adversary TTPs, attack surface management, and risk‑based prioritization. Organizational
Collaborate with detection engineering, SOC, and incident response teams to align intelligence and testing efforts with operational needs.
Partner with IT, OT, and business units to ensure threat intelligence and testing activities support enterprise and industrial environments.
Communicate threat trends, testing outcomes, and risk insights effectively to both technical and executive stakeholders.
Ensure intelligence and testing practices support compliance with internal policies and external regulatory requirements.
Requirements
Bachelor’s or Master’s degree in Cybersecurity, Intelligence Studies, or related field
6+ years of experience in threat intelligence, red/purple teaming, or adversary emulation Additional qualifications that could help you succeed even further in this role include:
Extensive experience in cyber threat intelligence lifecycle management, including collection, analysis, dissemination, and operationalization.
Skilled in profiling threat actors, mapping TTPs to MITRE ATT&CK, and producing strategic and tactical intelligence products.
Proficient in designing and executing red and purple team exercises using tools like Cobalt Strike, Caldera, and Atomic Red Team.
Strong understanding of threat intelligence platforms (e.g., MISP, ThreatConnect), STIX/TAXII protocols, and integration with SIEM/SOAR.
Experienced in adversary emulation, control validation, and threat‑informed defense strategies across IT and OT environments.
Effective at translating threat intelligence into detection logic, hunting hypotheses, and executive‑level risk narratives.
Proven ability to lead cross‑functional testing initiatives and influence detection and response strategies through intelligence insights.
Familiar with regulatory and compliance frameworks (e.g., NIST, ISO, CMMC) and their intersection with threat intelligence programs.
Strong knowledge of threat actor profiling, TTP mapping, and intelligence lifecycle management
Experience with threat intelligence platforms (TIPs), STIX/TAXII, and integrating intelligence into SOC and IR workflows
Proficiency in designing and executing red/purple team exercises, including use of tools like Cobalt Strike, Caldera, or Atomic Red Team
Familiarity with control validation frameworks (e.g., MITRE ATT&CK Evaluations, CARTA, BAS tools)
Strong communication and reporting skills, with the ability to translate technical findings into business risk language
Certifications such as GCTI, CTIA, OSCP, or CRTO are highly valued
Work location:
On site in Austin TX
Travel:
May include up to 10% domestic and international
Must be legally authorized to work in country of employment without sponsorship for employment visa status (e.g., H1B status).
Seniority level Mid‑Senior level
Employment type Full-time
Job function Information Technology
Industry Manufacturing
#J-18808-Ljbffr
Lead and mentor a team of threat intelligence analysts and security testing professionals, fostering a culture of curiosity, rigor, and continuous improvement.
Develop and execute strategies for threat intelligence gathering and security testing aligned with organizational risk management goals.
Set performance goals, conduct regular reviews, and provide feedback and development plans for team members.
Serve as the primary point of contact for threat intelligence and testing matters, communicating findings and recommendations to executive leadership and other stakeholders.
Manage budgets for tools, training, and resources related to threat intelligence and testing operations. Technical
Oversee the collection, analysis, and dissemination of tactical, operational, and strategic threat intelligence.
Maintain and evolve the threat intelligence platform (e.g., Anomali, MISP, TIP integrations).
Enrich detection and response efforts through intelligence‑led insights.
Lead internal and external penetration testing, purple team engagements, and threat emulation exercises.
Drive continuous control validation initiatives (e.g., MITRE ATT&CK alignment, breach simulation).
Collaborate with detection engineers and SOC to convert threat intel into actionable detections.
Guide hypothesis‑driven threat hunts based on current intelligence and adversary behaviors.
Maintain a technical understanding of adversary TTPs, attack surface management, and risk‑based prioritization. Organizational
Collaborate with detection engineering, SOC, and incident response teams to align intelligence and testing efforts with operational needs.
Partner with IT, OT, and business units to ensure threat intelligence and testing activities support enterprise and industrial environments.
Communicate threat trends, testing outcomes, and risk insights effectively to both technical and executive stakeholders.
Ensure intelligence and testing practices support compliance with internal policies and external regulatory requirements.
Requirements
Bachelor’s or Master’s degree in Cybersecurity, Intelligence Studies, or related field
6+ years of experience in threat intelligence, red/purple teaming, or adversary emulation Additional qualifications that could help you succeed even further in this role include:
Extensive experience in cyber threat intelligence lifecycle management, including collection, analysis, dissemination, and operationalization.
Skilled in profiling threat actors, mapping TTPs to MITRE ATT&CK, and producing strategic and tactical intelligence products.
Proficient in designing and executing red and purple team exercises using tools like Cobalt Strike, Caldera, and Atomic Red Team.
Strong understanding of threat intelligence platforms (e.g., MISP, ThreatConnect), STIX/TAXII protocols, and integration with SIEM/SOAR.
Experienced in adversary emulation, control validation, and threat‑informed defense strategies across IT and OT environments.
Effective at translating threat intelligence into detection logic, hunting hypotheses, and executive‑level risk narratives.
Proven ability to lead cross‑functional testing initiatives and influence detection and response strategies through intelligence insights.
Familiar with regulatory and compliance frameworks (e.g., NIST, ISO, CMMC) and their intersection with threat intelligence programs.
Strong knowledge of threat actor profiling, TTP mapping, and intelligence lifecycle management
Experience with threat intelligence platforms (TIPs), STIX/TAXII, and integrating intelligence into SOC and IR workflows
Proficiency in designing and executing red/purple team exercises, including use of tools like Cobalt Strike, Caldera, or Atomic Red Team
Familiarity with control validation frameworks (e.g., MITRE ATT&CK Evaluations, CARTA, BAS tools)
Strong communication and reporting skills, with the ability to translate technical findings into business risk language
Certifications such as GCTI, CTIA, OSCP, or CRTO are highly valued
Work location:
On site in Austin TX
Travel:
May include up to 10% domestic and international
Must be legally authorized to work in country of employment without sponsorship for employment visa status (e.g., H1B status).
Seniority level Mid‑Senior level
Employment type Full-time
Job function Information Technology
Industry Manufacturing
#J-18808-Ljbffr