About The Position

The Amazon Customer Ecosystems (ACES) team, part of Amazon Cyber Threat Intelligence (ACTI), is responsible for developing actionable intelligence on advanced cyber threats to Amazon ecosystems such as AWS, Ads and LEO their customers. We obtain indicators and other intelligence from a variety of internal and external sources and use that information to develop an understanding of sophisticated actors and their tools, techniques, and procedures (TTPs). We leverage that understanding to proactively identify and mitigate malicious activity. The successful candidate will analyze both attributed and unattributed actor TTPs to generate intelligence and insights into current threats. A deep understanding of current cyber threat actors as well as experience performing question-driven analysis is required. As a Security Intelligence Engineer, you will help enhance our capabilities by identifying new data sources, formulating new analytic techniques, and working across teams to drive their supporting capabilities. You will likewise work to harness expansive data sets and generate actionable and unique insights from them using database querying and statistical analysis. Your efforts will uncover previously-unknown threats and help drive innovation and continual improvement in the "state-of-the-art" of cyber threat intelligence analysis and dissemination at Amazon. This position requires that the candidate selected be a US Citizen.

Requirements

  • 3+ years of programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language experience
  • 2+ years of troubleshooting systems issues, analyzing logs, or automating basic tasks using command line tools (non-internship) experience
  • Bachelor's degree in computer science or equivalent
  • 3+ years of any combination of the following: application security frameworks, identity and access controls, incident response, mobile security, cloud computing and security, AI security, threat intelligence, and penetration testing experience
  • 2+ years of professional work experience, or experience in SQL or other relational databases
  • 3 years experience with tracking high-sophistication cyber threat groups
  • US Citizen

Nice To Haves

  • 2+ years of any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience
  • Knowledge of command line tools to troubleshoot protocols, analyze log outputs, or automate basic tasks
  • Knowledge of networking protocols such as HTTP(S), DNS, and TCP/IP
  • Experience with AWS products and services
  • Experience performing security activities across one or more phases of the software development lifecycle (SDLC), such as security design review, threat modeling, secure code review, and security testing
  • Experience with malware analysis, network flow analysis, and large scale data analysis. Experience with modern threat intelligence platforms (TIPs).

Responsibilities

  • Perform deep dive analysis of malicious artifacts.
  • Analyze large and unstructured data sets to identify trends and anomalies indicative of malicious activities.
  • Create security techniques and automation for internal use that enable you to operate at high speed and broad scale.
  • Contribute to Amazon's understanding of the current threat landscape and the techniques, tactics, and procedures associated with specific threats.
  • Draft and publish finished written threat intelligence products based on findings.
  • Periodic on-call responsibilities.

Benefits

  • health insurance (medical, dental, vision, prescription, Basic Life & AD&D insurance and option for Supplemental life plans, EAP, Mental Health Support, Medical Advice Line, Flexible Spending Accounts, Adoption and Surrogacy Reimbursement coverage)
  • 401(k) matching
  • paid time off
  • parental leave
  • sign-on payments
  • restricted stock units (RSUs)
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service