5+ years of experience in security or threat research. Proven expertise in tracking sophisticated threat actors. Strong analytical skills and ability to identify and monitor actors across large-scale data sets. Experience with infrastructure telemetry, query languages, and scripting for threat hunting. Familiarity with malware analysis and tools such as YARA. Ability to take initiative, work independently, and contribute to multiple aspects of threat intelligence programs. Excellent communication skills for technical and non-technical audiences. Legal authorization to work in the United States without visa sponsorship. Knowledge of major cloud providers (AWS, GCP, Azure), Kubernetes, and cloud-native architectures (preferred). Experience building scalable tools to analyze and exploit data sources (preferred). Track record of publicly communicating novel threat research (preferred). Background in incident response, threat intelligence, or threat hunting (preferred).