Head of Information Security Threat Intelligence
Listed on 2026-03-01
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Data Security
Head of Information Security Threat Intelligence
Apple is seeking an exceptional leader to manage our global Information Security Threat Intelligence team. This role is responsible for leadership of our existing team as well as defining and delivering on the future of the services they provide to our partners. We are looking for an experienced leader with a proven track record of building and managing high‑performing teams, developing and delivering on innovative threat intelligence strategies, and effectively communicating complex security risks to a wide variety of audiences.
The successful candidate and their team will be responsible for proactively identifying and helping to mitigate sophisticated threats across all corporate assets and geographies, in collaboration with partner intelligence and security teams.
- Strategic Vision & Leadership:
Define and deliver on a long‑term vision for our information security threat intelligence service, aligning it with overall business objectives and organization direction. This includes setting strategic direction, budgeting, resource allocation, as well as setting team and individual goals. - Team Development & Management:
Build, mentor, and lead a globally distributed team of highly skilled threat intelligence analysts. Foster a culture of collaboration, innovation, and continuous learning, while maintaining an operational cadence that matches that of the information security team and our partners. - Threat Landscape Monitoring & Analysis:
Oversee the comprehensive monitoring and analysis of the global threat landscape, identifying emerging threats, vulnerabilities, and attack campaigns relevant to our industries, suppliers, geographies, and business operations. Collaborate in this space with partners focused on government affairs and policy engagement to develop comprehensive analyses to inform decision making. - Advance Threat Hunting & Proactive Efforts:
Collaborate to develop and implement threat hunting strategies to proactively identify and stop attacks before they impact the organization. - Risk Assessment & Mitigation:
Conduct regular risk assessments, translating threat intelligence into actionable risk mitigation strategies for various business units and technical teams. Communicate risk effectively to stakeholders across the organization. - Response Integration:
Integrate threat intelligence seamlessly into the incident and vulnerability response process, accelerating investigations and improving remediation efforts. Continually evaluate this service for health and improvement opportunities. - Collaboration & Communication:
Establish and maintain strong relationships with internal stakeholders (e.g., intelligence, security, legal, and compliance teams) and external partners (e.g., public agencies, industry consortia, threat intelligence sharing groups). Effectively communicate complex security information to both technical and non‑technical audiences, including executive leadership. - Building Capabilities & Partnership:
Guide the team to decide when it is best to build new tooling and when to rely on others to build to your requirements, with a focus on reliable, performant tooling that can be used by partners across Apple. The team is responsible for maintaining critical tooling, but should seek to minimize those efforts and focus the team in areas they are uniquely skilled. - Budget Management & Resource Allocation:
Manage the budget and resources for the threat intelligence program, ensuring efficient and effective use of funds while managing risk.
- B.S. (computer science, intelligence studies, or relevant field), equivalent degree, or relevant work experience.
- 10+ years of experience in information security, with at least 5 years in threat intelligence leadership roles, including experience managing global teams.
- Proven track record of building and leading high‑performing threat intelligence teams, delivering measurable results, and driving strategic change.
- Deep understanding of the global threat landscape, advanced persistent threats (APTs), and sophisticated attack techniques.
- Expertise in various intelligence techniques,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).