Threat Intelligence Engineer
TENEX.AI
Location
Sarasota, FL HQ, Kansas City Metro
Employment Type
Full time
Location Type
On-site
Department
Security Operations
Company Summary: TENEX.AI is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is comprised of industry experts with deep experience in cybersecurity, automation, and AI-driven solutions. We’re a fast growing startup backed by industry experts and top tier investor Andreessen Horowitz. As an early employee, you’ll play a meaningful role in defining and building our culture. Get in on the ground floor. We’re a small but well-funded team that just raised a substantial round – joining now comes with limited risk and unlimited upside. We are rapidly growing and seeking top talent to join our mission of revolutionizing the cybersecurity landscape.
The Opportunity: We are seeking a highly motivated and detail-oriented Threat Intelligence Engineer to join our growing cybersecurity team. This role will support our threat intelligence efforts by collecting, analyzing, and reporting on emerging threats to enhance our overall security posture. You will be instrumental in assisting with the development of our threat intelligence program, collaborating with various security functions, and proactively identifying and helping to mitigate risks.
Culture is one of the most important things at TENEX.AI—check out our culture deck at culture.tenex.ai to experience how we champion it, valuing the unmatched collaboration and community of in-person work while offering flexibility for the best of the best.
The ideal candidate will be able to work onsite at our HQ based in Sarasota, FL (Tampa Metro Area) or Overland Park, KS (Kansas City Metro Area) location.
This role is for the extraordinary—the pinnacle 10x of 10x legends in any role— where we make exceptions to our in-person hiring to champion full remote, empowering you to conquer without boundaries while still inviting you to join our in-person energy from time to time. Please be aware that the competition for these remote roles is exceptionally fierce, and the standards for selection are significantly higher.
To be direct up front - If you’re looking at this position and you are not located in either of our physical locations, we strongly recommend you consider accepting one of our lucrative relocation packages to our epic hubs in Sarasota, Florida (outside Tampa), or Overland Park in the Kansas City metro—where trailblazers redefine cybersecurity with 10x impact!
In the Tampa Metro Area, you can break free from overly inflated cost of living sky-high taxes (like those of you trapped in California or New York) via our incredibly aggressive relocation packages, enjoying zero state income tax, boundless personal freedom, a pro-business surge, endless sunshine, and a pro-family haven in the master-planned Lakewood Ranch with elite amenities and vibes.
In the KC Metro Area, leverage those same powerhouse relocation perks for lower taxes, authentic Midwest values of integrity and community, and a supportive, family-oriented ecosystem for enduring wins.
What You'll Do:
General Cybersecurity Knowledge: Strong understanding of core cybersecurity principles, including network protocols, operating systems, security architectures, and common attack vectors. Familiarity with basic malware analysis concepts.
Threat Intelligence Collection: Assist in the proactive research, identification, and collection of threat intelligence from various sources, including open-source intelligence (OSINT), commercial feeds, and internal security data.
Analysis and Correlation Support: Analyze raw threat data to identify potential patterns and connections. Assist in correlating threat intelligence with internal security events and vulnerabilities. Focus on translating data into actionable technical indicators of compromise (IOCs) and contributing to the identification of adversary techniques.
Reporting and Dissemination: Draft clear and concise threat intelligence reports, briefings, and alerts for internal security teams (Security Operations, Incident Response).
Adversary and TTP Tracking: Assist in tracking and maintaining information on threat actors, including their motivations, capabilities, and tactics, techniques, and procedures (TTPs).
IOA/IOC Development Support: Support the development of technical indicators of attack (IOAs) and indicators of compromise (IOCs) based on observed adversary behaviors. Assist in integrating these indicators into security tools.
Vulnerability Intelligence: Monitor and analyze vulnerability disclosures and exploit trends to provide initial insights into potential risks.
Knowledge Sharing: Stay up-to-date with current cyber security threats, vulnerabilities, and industry best practices. Share findings with the security operations and detection engineering teams.
Stakeholder Engagement: Assist in building relationships with internal teams. Help prepare regular threat landscape updates for technical stakeholders.
Qualifications:
2-4+ years of experience in cybersecurity, with at least 1-2 years specifically focused on threat intelligence or a closely related field (e.g., Security Operations Center (SOC) analysis).
Solid foundational understanding of the threat landscape, including common threat actors and their objectives.
Familiarity with threat intelligence frameworks and methodologies (e.g., MITRE ATT&CK, STIX/TAXII).
Experience with or exposure to threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
Strong analytical and problem-solving skills.
Good written and verbal communication skills, with the ability to articulate technical findings clearly.
A keen desire to learn and grow within the threat intelligence discipline.
Ability to work independently and collaboratively in a team environment.
Preferred Skills:
Experience with scripting languages (e.g., Python) for simple data manipulation or automation is a plus.
Familiarity with foundational concepts of malware analysis.
Relevant cybersecurity certifications (e.g., CompTIA Security+, GCTI, etc.).
Experience in a regulated industry environment.
Why Join Us?
Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions.
Collaborate with a talented and innovative team focused on continuously improving security operations.
Competitive salary and benefits package.
A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.
If you're passionate about combining cybersecurity expertise with artificial intelligence and have experience with Google SecOps and Chronicle, we encourage you to apply!