8-10+ years in cybersecurity, threat detection, threat intel, DFIR, malware analysis, DevSecOps, or pre-sales engineering Working knowledge of malware analysis fundamentals Working knowledge of threat intel enrichment concepts (families, clusters, actors, tooling) Working knowledge of detection pipelines (SIEM/SOAR, EDR, mail security, IR workflows) Working knowledge of software supply chain security (SBOM, binary analysis, CI/CD security) Ability to learn, demonstrate, and discuss all Spectra modules Strong communication skills with both technical and executive audience levels Proven track record of successfully running POVs or technical evaluations Proven experience managing and developing Security Consultant teams, including hiring, onboarding, coaching, and performance management Demonstrated ability to lead a high-performing, distributed technical team, serving as both a player-coach and escalation point Strong cross-functional leadership skills, with a track record of aligning Security Consultants with Sales, Product, and Customer Success Experience with static/dynamic analysis tooling Experience with YARA, unpacking/emulation, behavioral classification Experience with post-compilation analysis & binary risk scoring Experience with SBOM validation and SLSA/SSDF frameworks Python scripting or API-based integrations Familiarity with threat intel feeds, event context, malware clustering or ecosystem mapping Experience supporting enterprise or high-security environments (Fortune 1000, government, regulated industries)