Develop and lead a team of security researchers who are responsible for ideating, planning and executing the cyber threat intelligence roadmap at Datadog which includes: threat hunting, threat intelligence, thought leadership and actor/malware tracking.
Build a unified threat research and intelligence effort to track threat actors targeting Datadog & their customers.
Work with leadership to set quarterly OKRs that address priority intelligence and research requirements.
Build and support a RFI program for intelligence stakeholders.
Build, and optimize the collection, processing and dissemination of strategic, tactical, and operational threat intelligence for intelligence stakeholders.
Track, research and experiment with the latest tactics, techniques & procedures for attacking and defending integrated production environments with Datadog.
Develop and maintain tools for automating the collection and analysis of intelligence.
Create and collaborate with Engineering & Product Management on proof of concept products, services, tools and simulations to demonstrate new capabilities and protections in Datadog environments.
Evangelize your team’s mission and regularly communicate with teams outside of your organizational structure.
Work closely with our Community team to develop thought-leadership threat research content for blogs, webinars, and conferences.
Build partnerships with external organizations dedicated to advancing cybersecurity for the world.
Requirements
A proven leader with experience leading threat research, cyber threat intelligence, security engineering or security research teams.
A technical practitioner who has hands-on experience building, investigating and reporting on threat activity in highly complex environments.
You have experience with collecting and anticipating intelligence requirements from your stakeholders and building out an operational model to support the production of intelligence products for them.
Connected to threat intelligence sharing groups and can help navigate the complexities of intelligence sharing.
You have led threat hunts to identify novel threat activity and turn that into new detections, new intelligence, and threat research publications.
You are comfortable with helping build proof-of-concept services, which include writing and testing code (e.g. Go, Python, Ruby), deploying code to cloud environments and monitoring of these services.
You have published blogs on threat intelligence topics, threat research, and spoken at security conferences on your findings.
Motivating, kind and humble people leader who focuses on growth and happiness for your team. You have the ability to grow talent by providing a proper mentorship and performance management environment while prioritizing empathy.
You value correctness and efficiency; you leave no stone unturned when reviewing documentation.