15,151 Cybersecurity jobs in the United States
Cybersecurity Threat Intelligence Lead

Posted 3 days ago
Job Viewed
Job Description
Become a part of the diverse and inclusive team within our nationally recognized award-winning Bank that is one of the strongest in the nation. Woodforest National Bank is privately owned, and our Employee Stock Ownership Plan is the largest shareholder. We focus on building relationships and discovering opportunities to better serve our communities and understand the financial needs of every customer we serve. At Woodforest we care and prove it by volunteering with local charities and foodbanks to give back to the communities we serve. By joining Woodforest you will become a part of one of the largest employee-owned banks in the country!
The Cybersecurity Threat Intelligence Lead will serve as the primary (or SME) on threats against the Bank's reputation, brand, and systems through multiple threat intelligence sources. The role will be responsible for design and implementation of threat intelligence systems and will also play a significant role in threat hunting and penetration testing activities.
This position will work 'in-office' during an initial training period. Once the training period is successfully completed, this position, at the manager's discretion, is eligible for hybrid work schedule.
Key Responsibilities:
· Works closely with internal technology teams, business stakeholders, MSSP, and outside vendors to research, analyze and monitor security threats.
· Mentors other analysts responsible for threat intel, incident response, network, cloud, endpoint and database security.
· Deploys and manages security solutions to assist with logging, alerting, and threat analysis.
· Security system monitoring and alerting appropriate parties of vulnerabilities, attacks, and other security issues.
· Recommends and implements policies and procedures to ensure adherence to security standards.
Competencies Required:
· Demonstrated success in managing, analyzing, and solving complex network technical issues.
· Technical knowledge of security configurations, log analysis, intrusion detection and mitigation.
· Strong verbal communication and technical writing skills with an ability to effectively interact with and convey information to people who possess varying levels of understanding on applicable topics.
· Ability to work independently while supporting a team environment.
· Solid understanding of network security practices, systems, and standards.
· Strong technology skills, including intermediate proficiency with Microsoft Office (Word, Excel, Outlook, PowerPoint, Visio) SIEM and EDR platforms.
· Customer service orientation with proven process and project management skills.
· Strategic and problem-solving mindset with developed analytical abilities and organizational skills.
Minimum Qualifications/Experience:
· 5 years' network or systems administration experience required.
· 2 years' EDR management experience required.
· 1 years' SIEM management experience required.
· Other beneficial experience, (i.e., VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, Threat Reputation/Intel Solution, CASB, Python, or Automation/Orchestration), preferred.
· Financial services or banking industry experience preferred.
Formal Education & Certification:
· IT related degree preferred.
Work Status:
· Full-Time.
Supervisory Responsibility:
· None.
Travel:
· Less than 10% travel expected.
Working Conditions:
· Conditions involve lifting no more than ten pounds, sitting most of the time, but may involve walking, moving, or standing for brief periods, and occasionally lifting and carrying articles like files, ledgers, folders, etc.
Disclaimer:
This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Nothing herein restricts management's right to assign or reassign duties and responsibilities to this job at any time.
Woodforest is an Equal Opportunity Employer, including Disability and Veterans.
**Job:** **Technology Services*
**Organization:** **Texas - Houston*
**Title:** *Cybersecurity Threat Intelligence Lead*
**Location:** *Texas-The Woodlands*
**Requisition ID:** *068348*
Cybersecurity Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
In this critical role, you will be responsible for collecting, analyzing, and disseminating threat intelligence to support the organization's defensive security operations. Your duties will include monitoring open-source intelligence (OSINT), dark web forums, and various threat feeds to identify emerging threats, adversary tactics, techniques, and procedures (TTPs). You will produce comprehensive threat intelligence reports, briefings, and alerts for security teams and stakeholders. This position requires you to develop and maintain intelligence gathering methodologies, conduct adversary tracking, and contribute to the development of threat hunting hypotheses. You will also collaborate with incident response teams to provide context and support during active security incidents.
We are looking for candidates with a Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent practical experience. A minimum of 4 years of experience in cybersecurity, with a specific focus on threat intelligence, security operations (SOC), or incident response, is required. Strong analytical skills, familiarity with threat intelligence platforms (TIPs), SIEM tools, and various cyber threat frameworks (e.g., MITRE ATT&CK) are essential. Experience with scripting languages (e.g., Python) for automation and data analysis is a significant advantage. Excellent written and verbal communication skills are necessary for reporting and presenting findings effectively. The ability to work independently, manage multiple priorities, and thrive in a fully remote, collaborative environment is crucial. Join our mission to protect and defend.
Location: Remote, formerly based in **Kansas City, Missouri, US**.
Cybersecurity Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Cybersecurity Analyst (Threat Intelligence)
Posted today
Job Viewed
Job Description
Key responsibilities include monitoring threat intelligence feeds, analyzing threat actor TTPs (Tactics, Techniques, and Procedures), and developing actionable intelligence reports to inform defensive strategies. You will be instrumental in detecting and preventing cyberattacks, performing security investigations, and contributing to the continuous improvement of the cybersecurity posture. Experience with SIEM tools (e.g., Splunk, QRadar), endpoint detection and response (EDR) solutions, and threat intelligence platforms is essential. Our client values individuals with strong analytical skills, excellent communication abilities, and a passion for staying ahead of evolving cyber threats. The ability to work effectively in a fast-paced environment and collaborate with other security teams is crucial. This is an exceptional opportunity for a seasoned cybersecurity professional to make a significant impact on protecting a leading financial institution in New York City, New York, US . You will be at the forefront of defending against sophisticated cyber adversaries.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, or a related field.
- Minimum 4-6 years of experience in cybersecurity, with a focus on threat intelligence or SOC analysis.
- Proven experience in identifying, analyzing, and responding to cyber threats.
- Knowledge of threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
- Proficiency with SIEM, IDS/IPS, and EDR tools.
- Experience with scripting languages (e.g., Python, PowerShell) for automation is a plus.
- Strong analytical and problem-solving skills.
- Excellent written and verbal communication skills.
- Relevant certifications such as CISSP, GIAC, or similar are highly desirable.
Cybersecurity Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Cybersecurity Analyst, Threat Intelligence
Posted 1 day ago
Job Viewed
Job Description
Responsibilities:
- Monitor, analyze, and report on current and emerging cyber threats.
- Collect and curate threat intelligence from various sources (OSINT, dark web, feeds).
- Develop detailed threat profiles and actor TTPs.
- Provide actionable intelligence to security operations and incident response teams.
- Create threat landscape reports and vulnerability assessments.
- Utilize threat intelligence platforms and security tools effectively.
- Collaborate with internal teams to implement threat mitigation strategies.
- Stay current with the latest cybersecurity trends and attack methods.
- Bachelor's degree in Computer Science, Cybersecurity, or a related field.
- Minimum of 4 years of experience in cybersecurity, with a focus on threat intelligence or analysis.
- Strong understanding of cybersecurity principles, attack vectors, and threat actor methodologies.
- Experience with threat intelligence platforms, SIEM tools, and OSINT techniques.
- Proficiency in data analysis and reporting.
- Excellent written and verbal communication skills.
- Ability to work independently and manage multiple priorities in a remote environment.
Cybersecurity Threat Intelligence Analyst
Posted 3 days ago
Job Viewed
Job Description
Be The First To Know
About the latest Cybersecurity Jobs in United States !
Cybersecurity Threat Intelligence Analyst
Posted 3 days ago
Job Viewed
Job Description
Cybersecurity Threat Intelligence Analyst - Senior
Posted 10 days ago
Job Viewed
Job Description
ECS is seeking a Sr. Cybersecurity Threat Intelligence Analyst to work in our Washington, DC office.
- Responsible for development and leadership of the CTI team establishment of the mission, maturity, optimizing, task management, and maintenance of threat intelligence processes and documentation.
- Identify threat tactics, methodologies, gaps, and shortfalls.
- Provide subject matter expertise to the development of cyber operations specific indicators.
- Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.
- Assist in the identification of intelligence collection shortfalls.
- Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets
- Monitor open-source websites for hostile content directed towards organizational or partner interests.
- Monitor operational environment and report on adversarial activities which fulfill leadership's priority information requirements.
- Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
- Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.
- Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.
- Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.
- Report intelligence-derived significant network events and intrusions.
- Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up to date.
General Description of Benefits
- 7+ years of experience in identifying potential and real threats to computing infrastructure and data and providing risk mitigation strategies and recommendations.
- Review prioritized intelligence requirements (PIR) for additions, deletions, and changes in priority.
- Ensure alignment with decision made by USCB leadership on program objectives, scope, and escalation criteria.
- Research, analyze, and disseminate classified cyber threat briefings, reports, and information in accordance with all relevant controls for handling and disseminating classified information.
- Strong written and verbal communication skills.
- Experience using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.
- Experience using multiple analytic tools, databases, and techniques (e.g., Analyst's Notebook, Maltego, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).
- Ability to communicate and brief complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
- Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
- Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
- Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
- Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
- Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.
- Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
- Bachelor's degree or equivalent work experience.
- 7+ years' cyber threat intelligence experience focused on Cyber operations fundamentals, operational intelligence analysis, and reporting.
- Certifications addressing advanced IDS concepts, applications protocols, concepts of TCP/IP and the link layer, DNS, fragmentation, IDS fundamentals and initial deployment, IDS rules, IPv6, network architecture and event correlation, network traffic analysis and forensics, packet engineering, silk and other traffic analysis tools, TCP, Tcpdump filters, UDP and ICMP, focus on new attack vectors (emphasis on cloud computing technology, mobile platforms and tablet computers), new vulnerabilities, existing threats to operating environments, information systems audit process, IT governance and management.
- Active TS/SCI clearance.
Cybersecurity Analyst Cyber Threat Intelligence
Posted 24 days ago
Job Viewed
Job Description
Responsibilities & Qualifications
TEAM SUMMARY
Responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. This team triages information collected from different threat intelligence sources, including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to a government agency's systems. This team supports enhancing the overall cybersecurity posture of an organization by delivering timely, relevant, information to stakeholders.
ACTIVITIES & RESPONSIBILITIES
-
Continuously monitor threat intelligence platforms, feeds, and cybersecurity news to detect emerging threats.
-
Conduct deep-dive investigations into alerts generated by Splunk or other monitoring tools.
-
Develop and maintain threat intelligence reports, dashboards, and threat models.
-
Collaborate with SOC, IR, and vulnerability management teams to contextualize and act on threat intelligence.
-
Support cyber threat hunting initiatives by leveraging threat intelligence indicators and hypotheses.
-
Participate in government-led cyber exercises or red/blue team simulations.
-
Provide regular briefings and updates to leadership and stakeholders on emerging cyber threats and trends.
-
Maintain knowledge of the latest cybersecurity trends, zero-day vulnerabilities, APT groups, and geopolitical developments impacting the threat landscape.
SKILLS
-
Cyber Threat Intelligence (CTI) Analysis - Identifying, analyzing, and interpreting cyber threats from various internal and external sources to assess relevance and impact on the organization.
-
Security Information and Event Management (SIEM) Tools - Proficient in using Splunk Enterprise Security for log analysis, alerting, and correlation of security events. Familiar with Microsoft Sentinel for threat detection and response.
-
Incident Response Support - Collaborating with incident response teams to provide threat intelligence that informs remediation and mitigation efforts.
-
Threat Actor Profiling - Studying adversary tactics, techniques, and procedures (TTPs) using frameworks such as MITRE ATT&CK to provide context and attribution.
-
Data Correlation and Enrichment - Correlating disparate data sets (e.g., IOC feeds, vulnerability databases, internal telemetry) to develop actionable intelligence.
-
Report Writing & Briefing - Producing written reports, threat assessments, and briefings for technical and non-technical stakeholders.
-
Communication and Stakeholder Engagement - Interfacing with cross-functional teams and government representatives to convey findings and recommend security posture enhancements.
-
Security Clearance Handling - Operating within a high-security environment with an active Top Secret (TS) clearance; handling and disseminating classified or sensitive information appropriately.
REQUIRED QUALIFICATIONS
-
Bachelor's degree, preferably in an IT-related field
-
10+ years of experience in IT with a minimum of 4 years in Cybersecurity
-
Active TS Clearance
-
Experience with Splunk Enterprise Security
PREFERRED QUALIFICATIONS & COMPETENCIES
-
Experience with Microsoft Sentinel
-
Related certifications, such as GIAC Cyber Threat Intelligence (GCTI)
Overview
We are seeking an experienced Cybersecurity Analyst / Cyber Threat Intelligence in support of a government customer to join our team. The Program Manager will be responsible for ensuring the successful execution of multiple IT initiatives, ensuring alignment with customer objectives, and managing project scope, schedule, budget, and risk. This role requires strong leadership, communication, and problem-solving skills to drive efficiency and deliver results.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at .
Apply now to explore jobs with us!
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".
"As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration".
Additional Job Information
WORK ENVIRONMENT AND PHYSICAL DEMANDS
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
-
Location: Huntsville Alabama
-
Remote or In-Person: On site
-
Type of environment: Office
-
Noise level: Medium
-
Work schedule: Schedule is day shift Monday - Friday.
-
Amount of Travel: Less than 10%
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
WORK AUTHORIZATION/SECURITY CLEARANCE
- Active Top Secret Clearance Required
OTHER INFORMATION
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
EQUAL EMPLOYMENT OPPORTUNITY
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
Job Locations US-AL-Huntsville
ID 2025-7902
Category Project/Program Management
Type Regular Full-Time