12,319 Cybersecurity jobs in the United States
Cybersecurity Threat Intelligence Lead
Posted 2 days ago
Job Viewed
Job Description
Take the next step toward your new career today!
Become a part of the diverse and inclusive team within our nationally recognized award-winning Bank that is one of the strongest in the nation. Woodforest National Bank is privately owned, and our Employee Stock Ownership Plan is the largest shareholder. We focus on building relationships and discovering opportunities to better serve our communities and understand the financial needs of every customer we serve. At Woodforest we care and prove it by volunteering with local charities and foodbanks to give back to the communities we serve. By joining Woodforest you will become a part of one of the largest employee-owned banks in the country!
The Cybersecurity Threat Intelligence Lead will serve as the primary (or SME) on threats against the Bank’s reputation, brand, and systems through multiple threat intelligence sources. The role will be responsible for design and implementation of threat intelligence systems and will also play a significant role in threat hunting and penetration testing activities. This position will work ‘in-office’ during an initial training period. Once the training period is successfully completed, this position, at the manager’s discretion, is eligible for hybrid work schedule.
Key Responsibilities: · Works closely with internal technology teams, business stakeholders, MSSP, and outside vendors to research, analyze and monitor security threats. · Mentors other analysts responsible for threat intel, incident response, network, cloud, endpoint and database security. · Deploys and manages security solutions to assist with logging, alerting, and threat analysis. · Security system monitoring and alerting appropriate parties of vulnerabilities, attacks, and other security issues. · Recommends and implements policies and procedures to ensure adherence to security standards.
Competencies Required: · Demonstrated success in managing, analyzing, and solving complex network technical issues. · Technical knowledge of security configurations, log analysis, intrusion detection and mitigation. · Strong verbal communication and technical writing skills with an ability to effectively interact with and convey information to people who possess varying levels of understanding on applicable topics. · Ability to work independently while supporting a team environment. · Solid understanding of network security practices, systems, and standards. · Strong technology skills, including intermediate proficiency with Microsoft Office (Word, Excel, Outlook, PowerPoint, Visio) SIEM and EDR platforms. · Customer service orientation with proven process and project management skills. · Strategic and problem-solving mindset with developed analytical abilities and organizational skills.
Minimum Qualifications/Experience: · 5 years’ network or systems administration experience required. · 2 years’ EDR management experience required. · 1 years’ SIEM management experience required. · Other beneficial experience, (i.e., VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, Threat Reputation/Intel Solution, CASB, Python, or Automation/Orchestration), preferred. · Financial services or banking industry experience preferred.
Formal Education & Certification: · IT related degree preferred.
Work Status: · Full-Time.
Supervisory Responsibility: · None.
Travel: · Less than 10% travel expected.
Working Conditions: · Conditions involve lifting no more than ten pounds, sitting most of the time, but may involve walking, moving, or standing for brief periods, and occasionally lifting and carrying articles like files, ledgers, folders, etc.
Disclaimer: This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Nothing herein restricts management’s right to assign or reassign duties and responsibilities to this job at any time.
Woodforest is an Equal Opportunity Employer, including Disability and Veterans.
Job: *Technology Services
Organization: *Texas - Houston
Title: Cybersecurity Threat Intelligence Lead
Location: Texas-The Woodlands
Requisition ID:
Cybersecurity Analyst - Threat Intelligence
Posted 3 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor, collect, and analyze threat intelligence from diverse sources (e.g., OSINT, dark web, security feeds, vendor reports).
- Identify, track, and profile threat actors, their motivations, and their TTPs.
- Develop and disseminate actionable threat intelligence reports to relevant stakeholders.
- Assess the potential impact of emerging threats on the organization's systems and data.
- Collaborate with security operations and incident response teams to provide context and support during investigations.
- Develop threat hunting hypotheses and proactively search for indicators of compromise (IOCs).
- Contribute to the development and refinement of security policies, procedures, and security controls.
- Stay current with the latest cybersecurity threats, vulnerabilities, and attack trends.
- Utilize various security tools and platforms for data analysis and intelligence gathering.
- Participate in tabletop exercises and incident response drills.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- 3-5 years of experience in cybersecurity, with a specific focus on threat intelligence or analysis.
- In-depth knowledge of cyber threats, malware, attack vectors, and threat actor methodologies.
- Proficiency with threat intelligence platforms, SIEM tools, and data analysis techniques.
- Experience with scripting languages (e.g., Python) for automation is a plus.
- Strong analytical and critical thinking skills.
- Excellent written and verbal communication skills, with the ability to present complex information clearly.
- Self-motivated with the ability to work effectively in a fully remote setting.
- Relevant certifications (e.g., GCTI, CTIA, CISSP) are highly desirable.
Cybersecurity Analyst Cyber Threat Intelligence
Posted 2 days ago
Job Viewed
Job Description
Responsibilities & Qualifications
TEAM SUMMARY
Responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. This team triages information collected from different threat intelligence sources, including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to a government agency's systems. This team supports enhancing the overall cybersecurity posture of an organization by delivering timely, relevant, information to stakeholders.
ACTIVITIES & RESPONSIBILITIES
-
Continuously monitor threat intelligence platforms, feeds, and cybersecurity news to detect emerging threats.
-
Conduct deep-dive investigations into alerts generated by Splunk or other monitoring tools.
-
Develop and maintain threat intelligence reports, dashboards, and threat models.
-
Collaborate with SOC, IR, and vulnerability management teams to contextualize and act on threat intelligence.
-
Support cyber threat hunting initiatives by leveraging threat intelligence indicators and hypotheses.
-
Participate in government-led cyber exercises or red/blue team simulations.
-
Provide regular briefings and updates to leadership and stakeholders on emerging cyber threats and trends.
-
Maintain knowledge of the latest cybersecurity trends, zero-day vulnerabilities, APT groups, and geopolitical developments impacting the threat landscape.
SKILLS
-
Cyber Threat Intelligence (CTI) Analysis - Identifying, analyzing, and interpreting cyber threats from various internal and external sources to assess relevance and impact on the organization.
-
Security Information and Event Management (SIEM) Tools - Proficient in using Splunk Enterprise Security for log analysis, alerting, and correlation of security events. Familiar with Microsoft Sentinel for threat detection and response.
-
Incident Response Support - Collaborating with incident response teams to provide threat intelligence that informs remediation and mitigation efforts.
-
Threat Actor Profiling - Studying adversary tactics, techniques, and procedures (TTPs) using frameworks such as MITRE ATT&CK to provide context and attribution.
-
Data Correlation and Enrichment - Correlating disparate data sets (e.g., IOC feeds, vulnerability databases, internal telemetry) to develop actionable intelligence.
-
Report Writing & Briefing - Producing written reports, threat assessments, and briefings for technical and non-technical stakeholders.
-
Communication and Stakeholder Engagement - Interfacing with cross-functional teams and government representatives to convey findings and recommend security posture enhancements.
-
Security Clearance Handling - Operating within a high-security environment with an active Top Secret (TS) clearance; handling and disseminating classified or sensitive information appropriately.
REQUIRED QUALIFICATIONS
-
Bachelor's degree, preferably in an IT-related field
-
10+ years of experience in IT with a minimum of 4 years in Cybersecurity
-
Active TS Clearance
-
Experience with Splunk Enterprise Security
PREFERRED QUALIFICATIONS & COMPETENCIES
-
Experience with Microsoft Sentinel
-
Related certifications, such as GIAC Cyber Threat Intelligence (GCTI)
Overview
We are seeking an experienced Cybersecurity Analyst / Cyber Threat Intelligence in support of a government customer to join our team. The Program Manager will be responsible for ensuring the successful execution of multiple IT initiatives, ensuring alignment with customer objectives, and managing project scope, schedule, budget, and risk. This role requires strong leadership, communication, and problem-solving skills to drive efficiency and deliver results.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at .
Apply now to explore jobs with us!
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".
"As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration".
Additional Job Information
WORK ENVIRONMENT AND PHYSICAL DEMANDS
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
-
Location: Huntsville Alabama
-
Remote or In-Person: On site
-
Type of environment: Office
-
Noise level: Medium
-
Work schedule: Schedule is day shift Monday - Friday.
-
Amount of Travel: Less than 10%
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
WORK AUTHORIZATION/SECURITY CLEARANCE
- Active Top Secret Clearance Required
OTHER INFORMATION
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
EQUAL EMPLOYMENT OPPORTUNITY
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
Job Locations US-AL-Huntsville
ID
Category Project/Program Management
Type Regular Full-Time
Senior Cybersecurity Threat Intelligence Analyst

Posted 8 days ago
Job Viewed
Job Description
**Responsibilities include but are not limited to:**
+ Proactively identifies, analyzes, and mitigates cybersecurity threats to the organization.
+ Possesses advanced skills in threat intelligence collection, analysis, and dissemination, with a deep understanding of the threat landscape and attack vectors.
+ Leads the development and implementation of threat intelligence strategies, ensuring the organization has timely and actionable insights to defend against evolving threats.
+ Conducts in-depth research on threat actors, malware, vulnerabilities, and attack techniques, producing comprehensive threat assessments and providing expert guidance on mitigation strategies.
+ Collaborates effectively with Security Teams, incident responders, and other stakeholders to proactively address threats and enhance the organization's security posture.
+ Is responsible for developing and maintaining threat intelligence platforms and tools, automating intelligence gathering, staying abreast of trends and techniques, and provides direction and mentorship to subordinate staff and coordinate with other Cybersecurity Threat Intelligence Analyst
**Minimum Qualifications:**
+ BA/BS in field necessary to assume Cybersecurity Threat Intelligence Analyst duties or 4 years of additional experience in lieu of a degree
+ 9+ years of experience with 5+ years of relevant Cybersecurity Threat Intelligence Analyst experience.
+ Progressive experience in cybersecurity threat intelligence or related areas, with a focus on threat analysis and mitigation.
+ Demonstrated expertise in collecting, analyzing, and disseminating threat intelligence from various sources (e.g., open-source intelligence (OSINT), threat feeds, security vendors).
+ Strong understanding of the cybersecurity threat landscape, including common attack vectors, threat actors, malware, and vulnerabilities.
+ Experience with threat intelligence platforms and tools (e.g., ThreatConnect, Anomali, MISP).
+ Experience with data analysis and visualization techniques.
+ CompTIA Security+ or equivalent. DoD -M IAT Level II certification.
**Preferred Qualifications:**
+ Master's degree in Cybersecurity, Intelligence Studies, or a related field.
+ Experience with incident response and threat hunting. Experience with malware analysis and reverse engineering, and security automation and orchestration.
+ Experience with developing and implementing threat intelligence strategies and advanced threat intelligence certifications (e.g., TRE). Certifications in digital forensics or incident response (e.g., GCFA, GCIH).
+ Experience with military/diplomatic operations working within a J-6/G-6/S-6 Directorate or with Special Operations Forces (SOF) or the Department of State (DoS), leading and performing cybersecurity risk assessments for and across multiple commands, agencies, and regionally distributed locations in a Security Operations Center (SOC).
+ At least one industry-recognized threat intelligence certification (e.g., Certified Threat Intelligence Analyst (CTIA), GCTI).
+ Experience at a DoD Combatant Command (e.g., SOUTHCOM, NORTHCOM, CENTCOM, CYBERCOM, INDOPACOM, EUCOM, AFRICOM, STRATCOM, TRANSCOM, SOCOM, SPACECOM) or a component is desired.
**Clearance Requirements:**
+ Must have current/active TS/SCI clearance
**Physical Requirements:**
+ Must be able to remain in stationary position for up to 50% of the time.
+ Must be able to deliver clear and effective communication verbally and via email, phone, and virtual communication platforms to interface with co-workers and customers.
+ Must be able to occasionally move about inside an office environment to access file cabinets, office machinery, and communicate with co-workers.
ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
If you are a qualified individual with a disability and require a reasonable accommodation to apply for a position with ManTech through its online applicant system, please email us at and provide your name and contact information.
Cybersecurity Analyst Cyber Threat Intelligence

Posted 8 days ago
Job Viewed
Job Description
**TEAM SUMMARY**
Responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. This team triages information collected from different threat intelligence sources, including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to a government agency's systems. This team supports enhancing the overall cybersecurity posture of an organization by delivering timely, relevant, information to stakeholders.
**ACTIVITIES & RESPONSIBILITIES**
+ Continuously monitor threat intelligence platforms, feeds, and cybersecurity news to detect emerging threats.
+ Conduct deep-dive investigations into alerts generated by Splunk or other monitoring tools.
+ Develop and maintain threat intelligence reports, dashboards, and threat models.
+ Collaborate with SOC, IR, and vulnerability management teams to contextualize and act on threat intelligence.
+ Support cyber threat hunting initiatives by leveraging threat intelligence indicators and hypotheses.
+ Participate in government-led cyber exercises or red/blue team simulations.
+ Provide regular briefings and updates to leadership and stakeholders on emerging cyber threats and trends.
+ Maintain knowledge of the latest cybersecurity trends, zero-day vulnerabilities, APT groups, and geopolitical developments impacting the threat landscape.
**SKILLS**
+ Cyber Threat Intelligence (CTI) Analysis - Identifying, analyzing, and interpreting cyber threats from various internal and external sources to assess relevance and impact on the organization.
+ Security Information and Event Management (SIEM) Tools - Proficient in using Splunk Enterprise Security for log analysis, alerting, and correlation of security events. Familiar with Microsoft Sentinel for threat detection and response.
+ Incident Response Support - Collaborating with incident response teams to provide threat intelligence that informs remediation and mitigation efforts.
+ Threat Actor Profiling - Studying adversary tactics, techniques, and procedures (TTPs) using frameworks such as MITRE ATT&CK to provide context and attribution.
+ Data Correlation and Enrichment - Correlating disparate data sets (e.g., IOC feeds, vulnerability databases, internal telemetry) to develop actionable intelligence.
+ Report Writing & Briefing - Producing written reports, threat assessments, and briefings for technical and non-technical stakeholders.
+ Communication and Stakeholder Engagement - Interfacing with cross-functional teams and government representatives to convey findings and recommend security posture enhancements.
+ Security Clearance Handling - Operating within a high-security environment with an active Top Secret (TS) clearance; handling and disseminating classified or sensitive information appropriately.
**REQUIRED QUALIFICATIONS**
+ Bachelor's degree, preferably in an IT-related field
+ 10+ years of experience in IT with a minimum of 4 years in Cybersecurity
+ Active TS Clearance
+ Experience with Splunk Enterprise Security
**PREFERRED QUALIFICATIONS & COMPETENCIES**
+ Experience with Microsoft Sentinel
+ Related certifications, such as GIAC Cyber Threat Intelligence (GCTI)
**Overview**
We are seeking an experienced **Cybersecurity Analyst / Cyber Threat Intelligence** in support of a government customer to join our team. The Program Manager will be responsible for ensuring the successful execution of multiple IT initiatives, ensuring alignment with customer objectives, and managing project scope, schedule, budget, and risk. This role requires strong leadership, communication, and problem-solving skills to drive efficiency and deliver results.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at .
Apply now to explore jobs with us!
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".
"As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration".
**Additional Job Information**
**WORK ENVIRONMENT AND PHYSICAL DEMANDS**
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
+ Location: Huntsville Alabama
+ Remote or In-Person: On site
+ Type of environment: Office
+ Noise level: Medium
+ Work schedule: Schedule is day shift Monday - Friday.
+ Amount of Travel: Less than 10%
**PHYSICAL DEMANDS**
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
**WORK AUTHORIZATION/SECURITY CLEARANCE**
+ Active Top Secret Clearance Required
**OTHER INFORMATION**
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
**EQUAL EMPLOYMENT OPPORTUNITY**
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
**Job Locations** _US-AL-Huntsville_
**ID** _ _
**Category** _Project/Program Management_
**Type** _Regular Full-Time_
Senior Cybersecurity Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Proactively collect, analyze, and disseminate actionable threat intelligence from various sources (e.g., OSINT, dark web, private feeds, government reports).
- Identify and track emerging cyber threats, threat actors, and their motivations and capabilities.
- Develop and maintain threat models and profiles of adversaries targeting our client's industry.
- Provide timely and relevant threat intelligence to incident response, security operations, and IT teams.
- Create comprehensive threat intelligence reports, briefings, and visualizations for technical and executive audiences.
- Develop and refine TTPs based on observed threat activity to enhance detection and prevention capabilities.
- Conduct deep-dive investigations into specific threat campaigns and malware.
- Automate intelligence collection, processing, and analysis workflows where possible.
- Collaborate with internal security teams and external partners to share threat information and coordinate response efforts.
- Mentor junior analysts and contribute to the development of threat intelligence best practices.
- Stay current with the latest cybersecurity trends, vulnerabilities, and exploit techniques.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Master's degree or relevant certifications (e.g., GIAC, CISSP) are highly valued.
- A minimum of 7 years of experience in cybersecurity, with a significant focus on threat intelligence analysis, incident response, or malware analysis.
- Demonstrated expertise in analyzing complex threat data, identifying indicators of compromise (IOCs), and understanding adversary TTPs.
- Proficiency with threat intelligence platforms, SIEM tools, and security analytics tools.
- Strong knowledge of various attack vectors, exploit techniques, and malware analysis.
- Excellent research, analytical, and critical thinking skills.
- Exceptional written and verbal communication skills, with the ability to articulate complex technical information clearly.
- Ability to work independently and collaboratively in a high-pressure, fast-paced environment.
- Experience with scripting or programming languages (e.g., Python) for automation is a strong asset.
- A deep understanding of geopolitical factors influencing cyber threats is beneficial.
Senior Cybersecurity Analyst - Threat Intelligence
Posted today
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze threat intelligence feeds, security alerts, and open-source information to identify potential threats and vulnerabilities.
- Research and track threat actors, their tactics, techniques, and procedures (TTPs), and motivations.
- Develop and maintain threat intelligence reports, dashboards, and presentations for various stakeholders, including technical teams and executive leadership.
- Collaborate with incident response teams to provide context and support during security investigations.
- Identify indicators of compromise (IOCs) and develop detection rules for security monitoring systems (SIEM, IDS/IPS).
- Contribute to the development and refinement of the organization's threat hunting methodologies.
- Evaluate and recommend new threat intelligence tools and technologies.
- Build relationships with external threat intelligence communities and information-sharing groups.
- Provide expertise on emerging threats and advise on security control improvements.
- Document threat intelligence processes, methodologies, and findings.
- Participate in tabletop exercises and simulations to test incident response capabilities.
- Stay current with the latest cybersecurity threats, trends, and defensive strategies.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence, incident response, or security operations.
- Proven experience in analyzing threat actor TTPs and developing actionable intelligence.
- Strong understanding of malware analysis, network security, and host-based security.
- Proficiency with SIEM platforms, IDS/IPS, endpoint detection and response (EDR) solutions, and threat intelligence platforms (TIPs).
- Experience with scripting languages (e.g., Python, PowerShell) for automation and data analysis is highly desirable.
- Familiarity with various threat intelligence frameworks (e.g., MITRE ATT&CK).
- Excellent analytical, research, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to present complex information clearly.
- Ability to work independently and as part of a collaborative team in a fast-paced environment.
- Relevant certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Threat Intelligence (GCTI), or CISSP are a plus.
Be The First To Know
About the latest Cybersecurity Jobs in United States !
Senior Cybersecurity Analyst (Threat Intelligence)
Posted today
Job Viewed
Job Description
Key responsibilities include:
- Collecting, analyzing, and correlating threat intelligence data from various sources, including open-source intelligence (OSINT), dark web monitoring, and internal security telemetry.
- Developing and maintaining threat models and intelligence reports on relevant threat actors, campaigns, and malware.
- Identifying new and emerging cyber threats, vulnerabilities, and attack vectors that could impact the organization.
- Providing timely and actionable intelligence to incident response, security operations, and IT teams.
- Developing and implementing threat hunting methodologies to proactively identify malicious activity.
- Assisting in the development and refinement of security policies, procedures, and controls based on threat intelligence.
- Conducting research on advanced persistent threats (APTs), nation-state actors, and organized cybercrime groups.
- Utilizing security information and event management (SIEM) systems and threat intelligence platforms (TIPs).
- Collaborating with internal stakeholders and external partners to share threat information and coordinate defensive actions.
- Mentoring junior analysts and contributing to the continuous improvement of the threat intelligence program.
Senior Cybersecurity Threat Intelligence Analyst
Posted 1 day ago
Job Viewed
Job Description
Senior Cybersecurity Threat Intelligence Analyst
Posted 1 day ago
Job Viewed
Job Description
Key Responsibilities:
- Conduct in-depth research and analysis of emerging cybersecurity threats, threat actors, and campaigns.
- Develop and maintain a comprehensive understanding of the global threat landscape, including nation-state actors, cybercriminals, and hacktivists.
- Analyze malware, phishing attempts, and other attack vectors to identify indicators of compromise (IOCs) and TTPs.
- Utilize various threat intelligence platforms, security tools, and open-source intelligence (OSINT) resources.
- Produce high-quality threat intelligence reports, briefings, and alerts for technical and executive audiences.
- Collaborate with Security Operations Center (SOC) analysts, incident response teams, and other security professionals to provide actionable intelligence.
- Develop and refine threat models and hypotheses based on collected intelligence.
- Contribute to the development and improvement of security monitoring and detection capabilities based on threat intelligence.
- Stay current with the latest cybersecurity trends, vulnerabilities, and defensive strategies.
- Participate in threat hunting activities to proactively identify threats within the network.
- Mentor junior analysts and share knowledge across the security team.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 5 years of experience in cybersecurity, with a strong focus on threat intelligence, incident response, or malware analysis.
- Demonstrated experience in analyzing threat data from various sources, including logs, network traffic, and threat feeds.
- Proficiency with threat intelligence tools, SIEM platforms, and security analytics software.
- Understanding of common attack vectors, malware families, and adversary TTPs (e.g., MITRE ATT&CK framework).
- Excellent analytical, research, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to convey complex technical information clearly.
- Ability to work independently and collaboratively in a remote team environment.
- Relevant certifications such as CySA+, GCIA, GCIH, or CISSP are a plus.
This is an excellent opportunity to contribute significantly to the cybersecurity posture of a leading organization while enjoying the flexibility of a remote work arrangement.