10-12 years of experience in cybersecurity, cyber threat intelligence, or cyber security operations. Leadership experience in a threat intelligence environment is a plus. Ability to distill highly technical information into business-centric language. Experience with Splunk (or other event monitoring capability), Crowdstrike, RecordedFuture, MS sentinel, SentinelOne, OpenCTI, MISP, Proofpoint. Deep knowledge of incident response, digital forensics, malware analysis, and threat intelligence. Hands-on experience with SOC technologies (SIEM, SOAR, EDR, IDS/IPS, log management). Strong understanding of MITRE ATT&CK framework and NIST Cybersecurity Framework. Excellent leadership, communication, and stakeholder management skills. Relevant certifications preferred: CISSP, CISM, GIAC (GSOM and GCTI), or equivalent.