Threat Intelligence Researcher (Cloud) (Remote from Massachusetts)
full-time • Remote
cybersecurity
threat intelligence
threat research
cloud security
This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Threat Intelligence Researcher (Cloud) in Massachusetts.
In this role, you will investigate and analyze sophisticated cyber threats targeting cloud environments, providing actionable intelligence to protect critical infrastructure. You will work closely with cross-functional teams to identify and track state-backed and financially motivated threat actors, leveraging both open and proprietary data sources. The position offers the opportunity to conduct large-scale telemetry analysis, attribute incidents to threat actors, and communicate findings to multiple audiences. You will help shape proactive defense strategies, contribute to tooling and automation for threat tracking, and advance security knowledge in a rapidly evolving cloud landscape. This is a highly impactful role for someone passionate about cybersecurity, research, and protecting cloud ecosystems.
Accountabilities:
- Identify, analyze, and track advanced threat actors targeting cloud environments, including state-backed and financially motivated groups.
- Conduct threat hunting across diverse data sources to detect malicious campaigns affecting cloud infrastructure.
- Leverage open-source and proprietary data to track attacker infrastructure and malware.
- Investigate and attribute security incidents, campaigns, and threat actors to better understand attacker behavior and motivations.
- Communicate novel findings to internal teams, customers, and the public, ensuring clarity and actionable insights.
- Collaborate with engineering, product, and operations teams to inform cloud security strategies and improve defenses.
- 5+ years of experience in security or threat research, with proven expertise in tracking sophisticated threat actors.
- Strong analytical skills and the ability to identify and monitor actors across multiple large-scale data sets.
- Experience with infrastructure telemetry, query languages, and scripting for threat hunting.
- Familiarity with malware analysis and using tools such as YARA for detection.
- Ability to take initiative, work independently, and contribute to multiple aspects of threat intelligence programs.
- Excellent communication skills for technical and non-technical audiences.
- Legal authorization to work in the United States without visa sponsorship.
- Knowledge of major cloud providers (AWS, GCP, Azure), Kubernetes, and cloud-native architectures.
- Experience building scalable tools to analyze and exploit data sources.
- Track record of publicly communicating novel threat research.
- Background in incident response, threat intelligence, or threat hunting.
- Competitive compensation and equity opportunities.
- Comprehensive health, dental, and vision coverage.
- Flexible remote work environment with collaboration across time zones.
- Professional development opportunities and access to cutting-edge security tools.
- Inclusive culture with support for diversity, equity, and belonging.
