VantageDC

Threat Intelligence Engineer, Global

Remote - US Full time

About Vantage Data Centers


Vantage Data Centers powers, cools, protects and connects the technology of the world’s well-known hyperscalers, cloud providers and large enterprises. Developing and operating across North America, EMEA and Asia Pacific, Vantage has evolved data center design in innovative ways to deliver dramatic gains in reliability, efficiency and sustainability in flexible environments that can scale as quickly as the market demands.

Position Overview

This role can be based in any of our US locations: Denver, CO; Phoenix, AZ; Quincy, WA; Santa Clara, CA; or Ashburn, VA or remotely in the US.

Vantage is seeking a highly analytical Threat Intelligence Engineer to support our cybersecurity and geopolitical risk programs through proactive threat identification, analysis, and escalation. You will join the Cybersecurity & Threat Intelligence team in monitoring emerging threats, assessing risk, and delivering clear, actionable intelligence that informs decision‑making across the business.

In this role, you will evaluate alerts from intelligence platforms, track threat actors and campaigns, and provide contextual analysis during active security incidents. You will leverage OSINT techniques, maintain awareness of global geopolitical developments, and assess third‑party risks that could impact our data center operations. You will also produce well‑structured intelligence reports and communicate findings to both technical and executive audiences.

As the data center industry continues to expand rapidly, so do the threats targeting critical infrastructure. This position offers a unique opportunity to help shape Vantage’s intelligence‑driven approach to protecting our global operations and ensuring we stay ahead of an evolving threat landscape.

Essential Job Functions

  • Perform triage of threat intelligence alerts across cyber, geopolitical, reputational, and operational domains
  • Conduct follow‑up analysis on threat actors, including tactics, techniques, operations, and intent, and assess potential impact to the company
  • Monitor geopolitical developments and evaluate downstream risk to business operations, personnel, vendors, and assets
  • Conduct open‑source intelligence (OSINT) investigations into threats targeting the company, its sites, and third parties
  • Perform continuous risk assessments related to cyber events, threat actor activity, and emerging threat trends
  • Conduct continuous risk assessments of third‑party entities, including vendors and partners, based on cyber, reputational, and geopolitical factors
  • Perform triage of Data Loss Prevention (DLP) alerts
  • Produce written intelligence products that clearly articulate risk, context, and impact to technical and non‑technical stakeholders
  • Manage and maintain threat intelligence tools to ensure effective monitoring, alerting, and investigative workflows

Duties

  • Monitor and triage alerts from threat intelligence platforms and escalate issues based on severity, credibility, and business impact
  • Track and analyze threat actors, campaigns, and operations, including cybercrime, hacktivism, insider threats, and nation‑state activity
  • Conduct risk assessments evaluating threats, vulnerabilities, likelihood, and potential business impact
  • Support incident response activities by providing threat context, attribution analysis, and external threat monitoring during active incidents
  • Utilize OSINT techniques to identify, assess, and monitor threats across social media, forums, news, and other open sources
  • Assess and monitor third‑party risk exposure related to cyber incidents, geopolitical developments, or reputational issues
  • Maintain situational awareness of global geopolitical events and translate those developments into actionable business risk insights
  • Produce clear, concise, and well‑structured intelligence reports tailored to executive, security, and cross‑functional audiences
  • Present findings and intelligence assessments verbally and in writing to internal stakeholders
  • Participate in post‑incident reviews and lessons‑learned activities to improve intelligence processes, tooling, and analytical tradecraft

Job Requirements

Skills

  • High proficiency in open‑source intelligence (OSINT) methodologies and tradecraft
  • Deep knowledge of OSINT techniques, tools, and investigative resources
  • Strong understanding of threat actor tactics, techniques, and strategies, and how they translate to real‑world risk
  • Demonstrated ability to perform threat triage and analytical prioritization
  • Experience assessing cyber, geopolitical, and reputational risk in a business context
  • Exceptional analytical and critical‑thinking skills
  • Exceptional writing abilities, with experience producing executive‑ready intelligence products
  • Strong communication skills, including the ability to brief complex threats clearly and concisely
  • High degree of adaptability in fast‑changing threat environments
  • Strong investigative mindset and attention to detail
  • Willingness and aptitude for continuous learning and skill development
  • Experience triaging and analyzing data loss prevention alerts

Experience

  • Five or more years of hands‑on experience in threat intelligence and open‑source intelligence (OSINT)
  • Demonstrated experience conducting threat actor analysis, campaign tracking, and operational intelligence
  • Experience performing risk assessments related to cyber incidents, geopolitical developments, and third‑party exposure
  • Hands‑on experience using threat intelligence platforms such as Recorded Future and LifeRaft Navigator  
  • Experience supporting incident response efforts with intelligence analysis and external threat monitoring
  • Prior exposure to data loss prevention alert triage
  • Master’s degree in a relevant discipline such as cybersecurity, intelligence studies, international relations, or a related field

Additional Details

  • Salary Range: $95,000 - $125,000 Base + Bonus (this range is based on Colorado market data and may vary in other locations)
  • This position is eligible for company benefits including but not limited to medical, dental, and vision coverage, life and AD&D, short and long-term disability coverage, paid time off, employee assistance, participation in a 401k program that includes company match, and many other additional voluntary benefits.
  • Compensation for the role will depend on a number of factors, including your qualifications, skills, competencies, and experience and may fall outside of the range shown.

We operate with No Ego and No Arrogance. We work to build each other up and support one another, appreciating each other’s strengths and respecting each other’s weaknesses. We find joy in our work and each other, actively seeking opportunities to inject fun into what we do. Our hard and efficient work is rewarded with an above market total compensation package. We offer a comprehensive suite of health and welfare, retirement, and paid leave benefits exceeding local expectations.


Throughout the year, the advantage of being part of the Vantage team is evident with an array of benefits, recognition, training and development, and the knowledge that your contribution adds value to the company and our community.

Don't meet all the requirements? Please still apply if you think you are the right person for the position. We are always keen to speak to people who connect with our mission and values.

Vantage Data Centers is an Equal Opportunity Employer

Vantage Data Centers does not accept unsolicited resumes from search firm agencies. Fees will not be paid in the event a candidate submitted by a recruiter without an agreement in place is hired; such resumes will be deemed the sole property of Vantage Data Centers.

We’ll be accepting applications for at least one week from the date this role is posted. If you're interested, we encourage you to apply soon—we’re excited to find the right person and will keep the role open until we do!