Summary
We are seeking a highly skilled and motivated Cyber Threat Intelligence Senior Analyst to join our cybersecurity team. The successful candidate will be responsible for identifying, analyzing, and mitigating advanced threats through proactive hunting, intelligence gathering, and incident response support. This role requires strong technical expertise, analytical skills, and the ability to translate threat intelligence into actionable defense strategies.
Key Responsibilities
Threat Intelligence
- Collect, analyze, and contextualize threat intelligence from internal telemetry, open sources (OSINT), dark web, commercial feeds, and ISAC / CERT channels
- Profile threat actors, their tactics, techniques, and procedures (TTPs), and provide early-warning intelligence to stakeholders
- Produce intelligence reports, advisories, and briefings tailored to technical and executive audiences
Threat Hunting
Proactively hunting for malicious activity across enterprise systems, endpoints, and networks using advanced tools (e.g., SIEM, EDR, NDR)Develop, test, and deploy custom detection logic, queries, and scripts to identify anomalies and potential intrusionsLeverage frameworks such as MITRE ATT&CK to map adversary behaviors and improve detection coverageCollaboration & Incident Response
Partner with SOC, Incident Response, and Vulnerability Management teams to provide intelligence-led defense and rapid containment of threatsSupport red team / blue team exercises and validate new detection methodologiesAct as a subject matter expert (SME) for threat intelligence and threat hunting during security investigationsContinuous Improvement
Automate intelligence collection, enrichment, and correlation workflowsContribute to the development of playbooks, hunting queries, and threat detection use casesStay current with emerging threats, vulnerabilities, and security technologiesPerson Specifications
Bachelors degree in Cybersecurity, Computer Science, or related fieldMinimum 5 years of experience in cybersecurity, with at least 2+ years in threat intelligence or threat hunting rolesStrong experience with SIEM platforms (e.g., Splunk, QRadar, ELK), EDR solutions (e.g., CrowdStrike, SentinelOne, Carbon Black), and packet analysis tools (e.g., Zeek, Suricata, Wireshark)Proficiency with threat hunting tools (e.g., Velociraptor, GRR Rapid Response, Kusto queries in Microsoft Sentinel, Elastic Hunting queries)Hands-on experience with Threat Intelligence Platforms (TIPs) (e.g.ThreatConnect, MISP, Anomali, Recorded Future) for ingestion, enrichment, and operationalization of IOCs and TTPsProficiency in scripting and automation (e.g., Python, PowerShell, Bash) for custom hunts, integrations, and enrichment pipelinesFamiliarity with malware analysis, reverse engineering, and memory forensics is a strong plusDeep understanding of MITRE ATT&CK, cyber kill chain, and threat modeling frameworksExperience with dark web monitoring, OSINT, and threat actor trackingStrong analytical, problem-solving, and communication skillsProactive, detail-oriented, and capable of working independently (onsite assignment for project-based engagement if needed)Strong communication skills with the ability to deliver complex technical insights in simple termsTeam player with a passion for continuous learning and advancing organizational defense capabilitiesCertifications (Preferred)
GIAC Cyber Threat Intelligence (GCTI)GIAC Advanced Threat Hunting, Detection, and Analysis (GDAT)Certified Threat Intelligence Analyst (CTIA)OSCP / OSCE / GCFA / GREM (advantageous)