About this role
Threat Engineer responsible for managing external attack surface, vulnerability validation, and bug bounty oversight, with a focus on threat intelligence, brand protection, phishing simulations, and incident response.
Key Responsibilities
- Govern Penetration Testing
- Audit Remediation
- Triage Bug Bounties
- Threat Intelligence & Brand Protection
- Human Risk & Awareness
Technical Overview
Role combines offensive security oversight with threat intelligence and brand protection, requiring hands-on vulnerability validation, DNS security expertise, and experience coordinating remediation across vendors.
Ideal Candidate
The ideal candidate is a threat engineer with 5+ years in security operations or 3+ years with an advanced degree, hands-on vulnerability validation experience, and strong domain management and bug bounty coordination skills. They should be comfortable working remotely with occasional on-site collaboration and have strong incident response capabilities.
Must-Have Skills
5+ years in security operationsthreat intelligenceor product security; or 3+ years with an advanced degreeHands-on experience manually validating web application and cloud vulnerabilitiesAbility to translate third-party pentest reports into actionable remediationStrong organizational discipline to manage external testing vendors and contractor workflowsExperience managing corporate domain portfoliosDNS configurationsand digital brand protectionRemote work capability with occasional on-site in Westlake/DallasTX area if local
Nice-to-Have Skills
Threat intelligence certifications (GCTICySA+/SecurityX)GWAPTOSCPPentest+CISSPCISACISM
Tools & Platforms
JiraThreat Intelligence Platform (TIP)DNS management platformsBug bounty platformsDequeNVDAJAWSVoiceOver
Required Skills
Vulnerability validationweb securitycloud securityDNS configurationsDNSSECDMARCdomain administrationbug bounty coordinationphishing simulationsincident escalationJiraThreat Intelligence Platform (TIP)DequeNVDAJAWSVoiceOver
Hard Skills
Vulnerability validationManual web application and cloud vulnerability assessmentPenetration testing oversightThreat intelligence platform (TIP)DNS configurationsDNS security (DNSSECDMARC)Domain administrationBug bounty program coordinationPhishing simulationsIncident escalation
Soft Skills
self-startertechnical translatorpragmatistgatekeeperanalytical
Certifications
Preferred
GIAC Web Application Penetration Tester (GWAPT)OSCPCompTIA PenTest+GIAC Cyber Threat Intelligence (GCTI)CySA+SecurityX
Keywords for Your Resume
Threat Engineersecurity operationsthreat intelligencepenetration testingpentestvulnerability validationDNS securityDNSSECDMARCdomain administrationbug bountyphishing simulationsincident escalationJiraTIPDequeNVDAJAWSVoiceOverCISSPCISACISMOSCPGWAPTGCTIPentest+CySA+SecurityXVulnerability validationWeb application securityCloud vulnerability assessmentPenetration testingBug bounty managementThreat intelligenceIncident escalation
Deal Breakers
Lack of 5+ years security experience, No experience validating web/app or cloud vulnerabilities, unwillingness to engage in on-site work if local
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile