Job Description:
We are a lean, fast-paced organization where security is paramount, but engineering velocity is sacred. We are looking for a highly adaptable Threat Engineer to take charge of our external attack surface, offensive security oversight, and human risk programs.
In this role, you will act as the critical bridge between external threat landscapes and our internal engineering teams. You will operate our incoming threat intelligence, manage our corporate domain portfolio, coordinate our crowdsourced bug bounty program, and provide technical oversight for our outsourced penetration testing. Your job is to identify, validate, and ensure the neutralization of external threats and vulnerabilities before they impact our platform or our B2B trust.
Who you’re committed to being:
A Self-Starter with Radical Ownership: You don't wait for a ticket to tell you something is wrong. You hold the authority to detect gaps and resolve them.
A Technical Translator: You can interpret a complex exploit payload or an unprocessed intelligence report and convert it into actionable requirements for a developer.
A Balanced Pragmatist: You understand that "secure" shouldn't mean "slow." You strive to integrate security into the engineering workflow rather than obstructing it.
A Diligent Gatekeeper: You hold external vendors and researchers to a high standard, ensuring that every pentest and bug bounty report adds genuine value to our security posture.
Analytically Rigorous: You enjoy the "hunt"—whether it's tracking down a typosquatted domain or reproducing a sophisticated OWASP Top 10 vulnerability.
What you’ll do:
Offensive Security & Bug Bounty Oversight
Govern Penetration Testing: Manage outsourced penetration testing programs, ensuring scopes align with compliance and business risk. Act as the primary technical point of contact to unblock vendors and ensure rigorous testing.
Audit Remediation: Oversee the vulnerability pipeline, ensuring findings are accurately translated into Jira tickets and tracking developer SLAs through to resolution.
Triage Bug Bounties: Act as the first line of defense for our crowdsourced vulnerability disclosure program; reproducing and validating exploit reports from external researchers.
Threat Intelligence & Brand Protection
Monitor & Analyze: Daily triage of our Threat Intelligence Platform (TIP) for credential exposures and active exploits. You’ll translate raw intelligence into proactive defensive measures.
Domain Administration: Serve as the primary admin for our Enterprise Domain Management platform, handling registrations, renewals, and DNS security (DNSSEC, DMARC, etc.).
Takedown Management: Actively monitor for typosquatting and brand impersonation, initiating takedowns when malicious intent is confirmed.
Human Risk & Awareness
Phishing Simulations: Design and analyze organizational phishing campaigns to improve employee resilience.
Incident Escalation: Serve as the lead investigator for user-reported phishing and social engineering attempts.
Experience you’ll bring:
Vulnerability Validation: Proven hands-on experience in manually assessing web application and cloud vulnerabilities. You should be comfortable reading code and executing payloads.
Program Management: Strong organizational discipline to manage external vendors and audit contractor workflows without needing direct authority.
Technical Breadth: A solid understanding of DNS configurations, web architectures, and how threat actors pivot through an external attack surface.
Strategic Thinking: Experience working on problems of diverse scope where you must devise solutions based on limited information or precedent.
Preferred certifications: Threat Intelligence & Defense: GIAC Cyber Threat Intelligence (GCTI), CompTIA Cybersecurity Analyst (CySA+/SecurityX). Offensive Security & AppSec: GIAC Web Application Penetration Tester (GWAPT), Offensive Security Certified Professional (OSCP), or CompTIA PenTest+. Security Program & Audit Governance: Certified Information Systems Security Professional (CISSP), ISACA Certified Information Systems Auditor (CISA), or Certified Information Security Manager (CISM).
Requirements:
Requires 5+ years of related or equivalent experience within security operations, threat intelligence, or product security; or 3+ years with an advanced degree.
Works on problems of diverse scope where analysis of information requires evaluation of identifiable factors. Devises solutions based on limited information and precedent and adapts existing approaches to resolve issues. Uses evaluation, judgment, and interpretation to select the right course of action. Work is done independently and is reviewed at critical points.
Proven experience manually validating web application and cloud vulnerabilities. Ability to critically review third-party pentest reports to ensure vendor quality and accuracy.
Strong organizational discipline to manage external testing vendors, audit contractor workflows, and drive cross-functional remediation efforts without requiring direct authority.
Experience managing corporate domain portfolios, DNS configurations, and digital brand protection strategies.
This is a remote role; however, applicants located within 45 miles of our Westlake/Dallas, TX office should expect to work on-site Tuesday through Thursday, with remote flexibility on Mondays and Fridays. This approach enables more effective collaboration, quicker decision-making, and a stronger culture, while still providing flexibility.
Why you’ll love working here:
We work in a blended environment that supports collaboration, flexibility, and connection across teams.
We are mission-driven, shaping the future of tech upskillling and delivering impact that matters.
We foster a culture of inclusion and belonging, where everyone can contribute and thrive.
We are always learning, creating an environment where you can take on new challenges, expand your skills, and grow with purpose.
Benefits include competitive compensation, bonus eligibility, comprehensive medical coverage, unlimited PTO, wellness reimbursement, professional development funds, and more.
About us:
Pluralsight provides the only learning platform dedicated to accelerating the technology skills and capabilities of today’s tech workforce. Thousands of companies, government organizations and individuals around the world rely on Pluralsight to support critical technology skill development in areas that are crucial to innovation including artificial intelligence, cloud computing, cybersecurity, software development, and machine learning. We offer highly curated content developed by vetted technology experts, industry leading skill assessments, and hands on, immersive learning experiences designed to help individuals skill-up faster.
Physical Requirements:
This role is primarily performed in an office or home office setting and involves standard computer-based work.
EEOC & Accommodations Statement:
Bring yourself. Pluralsight is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, or veteran status. We also consider qualified applicants with criminal histories, consistent with EEOC guidelines and local laws.
If you need an accommodation to apply, interview, or perform essential job functions, please visit the bottom of our website to learn how to request an accommodation. Learn more about our commitment to diversity, equity, inclusion, and belonging in our DEIB Report.
Pay Transparency:
The annual US base salary range for this role is $106,400 - $140,000 USD. Actual compensation will depend on location, skills, experience, and other factors. Additional benefits and bonuses may apply.
Applications must be submitted within 90 days after the initial posting date to be considered.
Recruiting Scam Notice:
Please be aware of recruiting scams. We’ll only contact you from an @pluralsight.com email or verified channels. We never ask for sensitive personal info or payments as part of the hiring process. All openings are posted on our Careers page.
#LI-SJ1
#LI-Remote
Top Skills
Similar Jobs at Pluralsight
What you need to know about the Boston Tech Scene
Key Facts About Boston Tech
- Number of Tech Workers: 269,000; 9.4% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Thermo Fisher Scientific, Toast, Klaviyo, HubSpot, DraftKings
- Key Industries: Artificial intelligence, biotechnology, robotics, software, aerospace
- Funding Landscape: $15.7 billion in venture capital funding in 2024 (Pitchbook)
- Notable Investors: Summit Partners, Volition Capital, Bain Capital Ventures, MassVentures, Highland Capital Partners
- Research Centers and Universities: MIT, Harvard University, Boston College, Tufts University, Boston University, Northeastern University, Smithsonian Astrophysical Observatory, National Bureau of Economic Research, Broad Institute, Lowell Center for Space Science & Technology, National Emerging Infectious Diseases Laboratories

