Threat Intelligence Manager, Ecosystem Threats
Role details
Job location
Tech stack
Job description
You will have a broad set of skills that make you a successful leader as threats to our users, devices, and services continue to evolve. capable of leading a team that analyzes cyber threats to our users' devices. Our environment fosters innovation, rapid solution development, and a liberating amount of autonomy in which you will be expected to lead security engineers and researchers in order to quickly bring new security methods and technologies addressing the complex needs of mobile and distributed computing.
Coordinate and distill team's input into development of security technologies. Lead efforts to analyze and understand advanced cyber actors, capabilities, and techniques. Collaborate with fellow managers to contextualize cyber threat intelligence for decision-makers and work cooperatively to drive solutions. Work with security engineers, project managers, and engineering managers in designing innovative mitigations to cyber threats while preserving privacy, ease-of-use, and user experience. Work closely with external partners in support of cyber threat intelligence activities. Remote work, with occasional travel.
Requirements
Intellectually curious team player with a genuine passion for leading people and building teams. Demonstrated creative, critical, and independent thinking capabilities and troubleshooting skills. Deep responsibility and drive to protect users from security threats, with a respect for their privacy and the balance we are committed to striking here at Apple. Growth mindset, thrives in fast-paced, changing environment. Honest about their limitations - it's ok to not know something as long as you are forthcoming with it and eager to learn more. Ability to distill complex problems into manageable tasks and then work with team to drive those tasks to completion. Some knowledge of macOS internals. Impeccable attention to detail., Management experience on a security or threat intelligence team. Significant prior experience conducting threat research. Expert-level understanding of the threat intelligence cycle and cyber operations. A clear communicator (verbal and in-writing), who can adapt their communication styles to match their audience (technical vs. non-technical).