Work alongside the AI and R&D teams to develop, train and finetune AI alerting models for a broad range of cybersecurity use cases.
Drive the incorporation of new data feeds into the Dataminr alerting platform to continually enrich Dataminr’s cybersecurity alerting.
Assist and inform cybersecurity alerting processes and operations, including identifying emerging threats and refining understanding of existing ones.
Identify new opportunities for cybersecurity alerting actions and implement them while working with cross-functional teams.
Apply knowledge of threat, vulnerability and exploitation trends to continually strengthen Dataminr's AI detection and contextualization capabilities.
Requirements
5+ years in a senior-level role conducting threat research, threat and trend analysis, or designing applications for alerting and detection purposes.
CTI subject-matter expertise across vulnerability intelligence, exploit intelligence, malware, phishing, ICS and more.
Extensive experience working with and awareness of cybersecurity data sources such as C2 sensor networks, Deep and Dark Web, code repositories and social media.
Knowledge of the cybersecurity SaaS space as well as SIEM, SOAR and TIP platforms (e.g., Splunk, QRadar, Google SecOps, Cortex XSOAR, Swimlane, Anomali, ThreatConnect, ThreatQ).
Self-motivation and an ability to handle multiple competing priorities; very strong attention to detail.
Certifications such as CISSP, CEH, OSCP, and SANS/GIAC would be a plus