8+ years of experience in vulnerability analysis/research or cyber threat intelligence Active exploitation awareness, including how zero‑days/n‑days propagate, PoC weaponization trends, and defender impact. Proven ability to work with discretion, handle sensitive information, and build trusted relationships. Vulnerability ecosystem fluency: CVE/CWE, NVD/NIST, CISA KEV, EPSS, vendor advisories, and patch/mitigation lifecycles. Familiarity with the penetration testing industry and vulnerability management ecosystems Outstanding communication and interpersonal skills; able to influence at all levels. Exceptional organizational skills with the ability to manage multiple priorities and stakeholders. Familiarity with and comfort writing Python Experience performing data analysis and creating visualizations to illustrate broad trends Experience communicating vulnerability and threat information to technical audiences outside of cyber security Digital presence: experience using social channels and community forums to amplify research responsibly. Public speaking experience at conferences, webinars, podcasts, and customer briefings; comfortable fielding live Q&A. Conference publications or awards (e.g., Black Hat, DEF CON, BSides, FIRST). Media training and experience briefing reporters or analysts. Bug bounty/VDP experience, including triage or program participation from either side.