×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Principal Cyber Threat Intelligence Engineer

Remote / Online - Candidates ideally in
Renton, King County, Washington, 98056, USA
Listing for: Providence
Remote/Work from Home position
Listed on 2025-12-21
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below
Position: Principal Cyber Threat Intelligence Engineer IS

Role Overview

Providence is looking for a seasoned Principal Security Engineer with deep expertise in Cyber Threat Intelligence. In this pivotal role, you’ll be the strategic force behind identifying and neutralising emerging threats, safeguarding critical systems, and empowering Providence’s Global Security Operations Center. Your insights will directly inform risk strategies and guide executive decision‑making, making you a key player in protecting millions of lives through secure healthcare technology.

If you’re passionate about staying ahead of adversaries and driving innovation in cybersecurity, this is your chance to lead at the highest level.

Hybrid Work Option & Locations

Providence offers hybrid work options for candidates living within a daily commuting distance—up to 65 miles—from any of our primary office locations listed below.

  • Washington:
    Seattle, Redmond, Renton, Vancouver
  • California:
    Los Angeles, Irvine
  • Oregon:
    Portland

Please note the following important details regarding this position.

  • This is a hybrid role, involving a combination of in‑office and remote work each week.
  • The weekly hybrid schedule will be determined by a manager based on departmental needs.
Essential Functions
  • Conduct in‑depth analysis and research on cyber threats, including identifying threat actors, their motivations, tactics, techniques, and procedures (TTPs), and providing insights on their potential impact on the organization.
  • Prepare and deliver well‑researched, impactful analytic findings that combine self‑driven research and team threat‑hunting efforts to convey cyber threat risk and impact, tailored appropriately to technical and non‑technical stakeholders, including executives.
  • Serve as a mentor to teammates for leveraging advanced analytic toolsets such as Structured Analytic Techniques.
  • Classify, categorize, and analyze malware and threats, translating this into actionable detections using frameworks such as MITRE ATT&CK.
  • Maintain strong breadth and depth of knowledge about the healthcare industry threat landscape, including threat actors, malware, hacking techniques, emerging threats, and trends that may impact the organization.
  • Collaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that supports CTI, CIRT, Attack Surface Management, and other cybersecurity initiatives.
  • Develop and maintain threat profiles with tactical intelligence to enhance detection engineering and threat‑hunting operations.
  • Perform root‑cause analysis and provide recommendations for proactive measures to help prevent cyber intrusions.
  • Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense.
  • Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations.
  • Monitor and assess emerging technologies, such as AI and machine learning, to augment and enhance threat detection, triage, and analysis.
Required Qualifications
  • Bachelor’s Degree in Computer Engineering, Computer Science, Mathematics, Engineering — or a combination of equivalent education/experience.
  • Upon hire: CISSP, CEH, or an equivalent certification.
  • Eight or more years of related experience.
  • Experience designing security controls and countermeasures for operating systems, databases, applications, web services, user devices, and wireless networks.
Preferred Qualifications
  • Master’s Degree in Computer Engineering, Computer Science, Mathematics, Engineering.
  • Experience in a healthcare environment.
  • Eight or more years of cyber threat intelligence analysis experience.
  • Experience conducting in‑depth analysis and research on cyber threats, including identifying threat actors’ motivations, intent, and TTPs.
  • Skilled in correlating intelligence from multiple sources to assess potential organizational impact.
  • Familiarity with reverse engineering and categorizing malware.
  • Strong knowledge of healthcare cybersecurity risks, including ransomware, phishing, and supply chain vulnerabilities.
  • Demonstrated experience applying frameworks such as MITRE ATT&CK, Cyber Kill Chain,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary