via Ashby
$70K - 90K a year
Collect, analyze, and report on emerging cyber threats to support threat intelligence and security operations.
2-4 years cybersecurity experience with 1-2 years in threat intelligence or SOC analysis, familiarity with threat intelligence frameworks, SIEM, strong analytical and communication skills, and preferably security certifications.
Company Summary: TENEX.AI is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is comprised of industry experts with deep experience in cybersecurity, automation, and AI-driven solutions. We’re a fast growing startup backed by industry experts and top tier investor Andreessen Horowitz. As an early employee, you’ll play a meaningful role in defining and building our culture. Get in on the ground floor. We’re a small but well-funded team that just raised a substantial round – joining now comes with limited risk and unlimited upside. We are rapidly growing and seeking top talent to join our mission of revolutionizing the cybersecurity landscape. The Opportunity: We are seeking a highly motivated and detail-oriented Threat Intelligence Engineer to join our growing cybersecurity team. This role will support our threat intelligence efforts by collecting, analyzing, and reporting on emerging threats to enhance our overall security posture. You will be instrumental in assisting with the development of our threat intelligence program, collaborating with various security functions, and proactively identifying and helping to mitigate risks. Location: Remote with an option of a company paid relocation package to either Kansas City or Sarasota metro area. Culture is one of the most important things at TENEX.AI—explore our culture deck at culture.tenex.ai to witness how we embody it, prioritizing the irreplaceable collaboration and community of in-person work. This role is perfect for those eager to relocate and commute here, where family-first visionaries build unbreakable cybersecurity empires. Ditch the crushing taxes and restrictions of high-cost states with our incredibly aggressive relocation packages, crafted to propel you and your loved ones into this thriving hub effortlessly and profitably—imagine lower taxes amplifying your success! For candidates who embody the rare "10x of 10x" talent, we offer the flexibility of fully remote work. If you are an exceptional, unrivaled force in this role and prefer not to relocate at this time, we encourage you to apply for this remote-first position. Please be aware that the competition for these remote roles is exceptionally fierce, and the standards for selection are significantly higher. What You'll Do: General Cybersecurity Knowledge: Strong understanding of core cybersecurity principles, including network protocols, operating systems, security architectures, and common attack vectors. Familiarity with basic malware analysis concepts. Threat Intelligence Collection: Assist in the proactive research, identification, and collection of threat intelligence from various sources, including open-source intelligence (OSINT), commercial feeds, and internal security data. Analysis and Correlation Support: Analyze raw threat data to identify potential patterns and connections. Assist in correlating threat intelligence with internal security events and vulnerabilities. Focus on translating data into actionable technical indicators of compromise (IOCs) and contributing to the identification of adversary techniques. Reporting and Dissemination: Draft clear and concise threat intelligence reports, briefings, and alerts for internal security teams (Security Operations, Incident Response). Adversary and TTP Tracking: Assist in tracking and maintaining information on threat actors, including their motivations, capabilities, and tactics, techniques, and procedures (TTPs). IOA/IOC Development Support: Support the development of technical indicators of attack (IOAs) and indicators of compromise (IOCs) based on observed adversary behaviors. Assist in integrating these indicators into security tools. Vulnerability Intelligence: Monitor and analyze vulnerability disclosures and exploit trends to provide initial insights into potential risks. Knowledge Sharing: Stay up-to-date with current cyber security threats, vulnerabilities, and industry best practices. Share findings with the security operations and detection engineering teams. Stakeholder Engagement: Assist in building relationships with internal teams. Help prepare regular threat landscape updates for technical stakeholders. Qualifications: 2-4+ years of experience in cybersecurity, with at least 1-2 years specifically focused on threat intelligence or a closely related field (e.g., Security Operations Center (SOC) analysis). Solid foundational understanding of the threat landscape, including common threat actors and their objectives. Familiarity with threat intelligence frameworks and methodologies (e.g., MITRE ATT&CK, STIX/TAXII). Experience with or exposure to threat intelligence platforms (TIPs) and security information and event management (SIEM) systems. Strong analytical and problem-solving skills. Good written and verbal communication skills, with the ability to articulate technical findings clearly. A keen desire to learn and grow within the threat intelligence discipline. Ability to work independently and collaboratively in a team environment. Preferred Skills: Experience with scripting languages (e.g., Python) for simple data manipulation or automation is a plus. Familiarity with foundational concepts of malware analysis. Relevant cybersecurity certifications (e.g., CompTIA Security+, GCTI, etc.). Experience in a regulated industry environment. Why Join Us? Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions. Collaborate with a talented and innovative team focused on continuously improving security operations. Competitive salary and benefits package. A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies. If you're passionate about combining cybersecurity expertise with artificial intelligence and have experience with Google SecOps and Chronicle, we encourage you to apply!
This job posting was last updated on 12/1/2025