Threat Intelligence Researcher
Dream
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
About Dream
At Dream, we redefine cyber defense vision by combining AI and human expertise to create products that protect nations and critical infrastructure. This is more than a job; it’s a Dream job. Dream is where we tackle real-world challenges, redefine AI and security, and make the digital world safer. Let’s build something extraordinary together.
Dream's AI cybersecurity platform applies a new, out-of-the-ordinary, multi-layered approach, covering endless and evolving security challenges across the entire infrastructure of the most critical and sensitive networks. Central to our Dream's proprietary Cyber Language Models are innovative technologies that provide contextual intelligence for the future of cybersecurity.
At Dream, our talented team, driven by passion, expertise, and innovative minds, inspires us daily. We are not just dreamers, we are dream-makers.
The Role: Threat Intelligence Researcher
We are on an expedition to find you, someone who is passionate about turning research into reliable, production-grade capabilities. You’ll play a major role in building and shaping our next-gen CTI platform across attribution, pivoting, infrastructure prediction, EASM, and the STIX/OpenCTI knowledge base.
Key Responsibilities
- Execute the CTI research roadmap across attribution, infra prediction, EASM, and the STIX knowledge base.
- Design and implement graph-pivoting, attribution heuristics, and temporal/link models (sequence/survival/Hawkes-style).
- Build high-signal EASM detectors: passive discovery and safe active probing per ROE; capture reproducible evidence.
- Normalize, enrich, and deduplicate intel into STIX 2.1 aligned to our ontology; maintain/enhance TAXII/OpenCTI/MISP connectors.
- Ship detectors/models and enrichment services with AI/Platform teams; contribute tests, docs, and runbooks.
- Curate datasets, define ground truth, and evaluate KPIs (coverage, lead-time, precision/recall, FPR); iterate to improve signal-to-noise.
- Produce watchlists, concise briefs, and early-warning hypotheses for stakeholders and priority investigations.
- Uphold governance, ethics, provenance, and data-quality standards.
Desired Skills and Experience
- 4-7+ years in CTI/EASM/offensive research or adversary-infra analysis.
- DNS, BGP/ASNs, TLS/PKI & CT logs, hosting/CDN/cloud patterns, domain lifecycle, phishing ecosystems.
- Communities/embeddings/clustering; temporal/link modeling and practical evaluation.
- Passive discovery and safe active probing; evidence discipline and noise reduction.
- STIX 2.1, ATT&CK, TAXII; advantage for OpenCTI/MISP; ontology alignment and validation.
- Python (pandas, notebooks, scikit-learn, networkx/igraph); Neo4j/Elasticsearch; Kafka/SQS/Redis; Docker/Kubernetes.
- Prompting/tool-use for extraction/normalization; agentic patterns with guardrails and sanity checks.
- Analytical writing; collaborative, version-controlled workflow (Git); documentation rigor.
Key skills/competency
- CTI research
- EASM
- Adversary infrastructure analysis
- Graph pivoting
- STIX 2.1
- Python
- Neo4j
- Elasticsearch
- Docker
- Kubernetes
How to Get Hired at Dream
- Research Dream's mission: Understand their AI cyber defense vision and impact on critical infrastructure.
- Tailor your resume: Highlight CTI, EASM, and Python skills specifically for this Threat Intelligence Researcher role.
- Showcase relevant projects: Demonstrate practical experience in attribution, infra prediction, or offensive research.
- Prepare for technical questions: Review DNS, BGP, TLS, STIX, and experience with Neo4j/Elasticsearch.
- Emphasize your passion: Articulate your drive to make the digital world safer and contribute to security innovation.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background