×
Register Here to Apply for Jobs or Post Jobs. X

Threat Intelligence & Testing Manager

Job in Saint Paul, Ramsey County, Minnesota, 55199, USA
Listing for: PRI Technology
Full Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity, Data Security
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

Join to apply for the Threat Intelligence & Testing Manager role at PRI Technology

4 weeks ago Be among the first 25 applicants

Join to apply for the Threat Intelligence & Testing Manager role at PRI Technology

Get AI-powered advice on this job and more exclusive features.

I have a new full time opportunity for a Threat Intelligence & Testing Manager based in Austin, TX. This person will lead a team of analysts and security professionals focused on identifying, analyzing, and simulating cyber threats to proactively defend the organization's enterprise and manufacturing environments. This role is critical in enhancing threat visibility, validating security controls, and informing strategic defense initiatives.

The ideal candidate will possess a strong background in cyber threat intelligence, adversary emulation, and red/purple team operations, combined with proven leadership and communication skills.

Responsibilities

Management

  • Lead and mentor a team of threat intelligence analysts and security testing professionals, fostering a culture of curiosity, rigor, and continuous improvement.
  • Develop and execute strategies for threat intelligence gathering and security testing aligned with organizational risk management goals.
  • Set performance goals, conduct regular reviews, and provide feedback and development plans for team members.
  • Serve as the primary point of contact for threat intelligence and testing matters, communicating findings and recommendations to executive leadership and other stakeholders.
  • Manage budgets for tools, training, and resources related to threat intelligence and testing operations.
Technical

  • Oversee the collection, analysis, and dissemination of tactical, operational, and strategic threat intelligence.
  • Maintain and evolve the threat intelligence platform (e.g., Anomali, MISP, TIP integrations).
  • Enrich detection and response efforts through intelligence-led insights.
  • Lead internal and external penetration testing, purple team engagements, and threat emulation exercises.
  • Drive continuous control validation initiatives (e.g., MITRE Telecommunication&CK alignment, breach simulation).
  • Collaborate with detection engineers and SOC to convert threat Client into actionable detections.
  • Guide hypothesis-driven threat hunts based on current intelligence and adversary behaviors.
  • Maintain a technical understanding of adversary TTPs, attack surface management, and risk-based prioritization.
Organizational

  • Collaborate with detection engineering, SOC, and incident response teams to align intelligence and testing efforts with operational needs.
  • Partner with IT, OT, and business units to ensure threat intelligence and testing activities support enterprise and industrial environments.
  • Communicate threat trends, testing outcomes, and risk insights effectively to both technical and executive stakeholders.
  • Ensure intelligence and testing practices support compliance with internal policies and external regulatory requirements.
Qualifications

  • Bachelor's or Master's degree in Cybersecurity, Intelligence Studies, or related field
  • 6+ years of experience in threat intelligence, red/purple teaming, or adversary emulation
  • Extensive experience in cyber threat intelligence lifecycle management, including collection, analysis, dissemination, and operationalization.
  • Skilled in profiling threat actors, mapping TTPs to MITRE Telecommunication&CK, and producing strategic and tactical intelligence products.
  • Proficient in designing and executing red and purple team exercises using tools like Cobalt Strike, Caldera, and Atomic Red Team.
  • Strong understanding of threat intelligence platforms (e.g., MISP, Threat Connect), STIX/TAXII protocols, and integration with SIEM/SOAR.
  • Experienced in adversary emulation, control validation, and threat-informed defense strategies across IT and OT environments.
  • Effective at translating threat intelligence into detection logic, hunting hypotheses, and executive-level risk narratives.
  • Proven ability to lead cross-functional testing initiatives and influence detection and response strategies through intelligence insights.
  • Familiar with regulatory and compliance frameworks (e.g., NIST, ISO, CMMC) and their…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary