Threat Intelligence Lead
Listed on 2026-01-12
-
IT/Tech
Cybersecurity, Data Security
Get AI-powered advice on this job and more exclusive features.
About the CompanyEvery day, NuHarbor Security improves the cybersecurity of our clients by making it stronger and easier to understand. Our comprehensive suite of security services, from strategic advising to 24‑hour monitoring and management, provides an organizational view of security that is focused on results and recommendations that are valuable for both business and technical leaders. We're growing quickly because our clients, and the general market, are looking for these outcomes and for the data it gives them to explain, promote, and justify their security investment and mission.
The RoleThe Threat Intelligence Lead is critical in proactively searching for indicators of compromise (IOCs) and indicators of attack (IOAs) and actively hunting for threats not yet formally categorized by a threat actor. This position requires collaborating with Detection Engineering teams to refine detection capabilities, identifying emerging threats and developing and implementing detection strategies and methodologies. The Lead also directly works with clients to provide feedback, recommendations, and remediation guidance as needed.
Whatyou'll do
- Live by the NuHarbor corporate values:
Help Clients Win, Always Improve, Protect the House. - Conduct client‑directed proactive investigations to identify cyber threats, advanced persistent threats, and anomalous activity within enterprise networks and endpoints.
- Research new and existing threat actors and associated tactics, techniques, and procedures (TTPs) to develop a detailed understanding of their potential impact on the client.
- Perform deep‑diving analysis of suspected security incidents to determine impact, risk, and response actions.
- Lead and manage threat research initiatives to assess emerging threats and vulnerabilities, and correlate adversary activities, attack chains, and artifacts to provide threat intelligence that supports the timely detection of active threats.
- Identify and propose automated detections for new and previously unknown threats. Collaborate with internal and external cyber organizations to mitigate risk by testing, deploying, and developing investigative playbooks.
- Produce and disseminate timely, actionable, and relevant threat intelligence to detection engineering to inform NHS's detection package based on relevant threats to NuHarbor's client base.
- Develop and deliver finalized threat intelligence to the SOC that directs intelligence‑driven threat hunting efforts and convert results into actionable intelligence that can inform the adjustment of existing detections and the creation of new detections.
- Lead threat intelligence requirement development and intelligence delivery (tactical, operational, and strategic) across all applicable NuHarbor stakeholders.
- Lead the management, maintenance, and general administration of NuHarbor's threat intelligence tooling, infrastructure, Threat Intel Platform (TIP), threat feeds, and threat information sharing efforts.
- Work with Managed Services and Client Success to deliver high‑priority situational awareness/intelligence to the NuHarbor client in response to emergent threats while collaborating with detection engineering to provide timely solutions.
- Act as a centralized point for threat hunters and red team to collaborate with when researching emerging threats that provide opportunities to address detection gaps.
- Bachelor’s Degree and five (5) years of experience in a cybersecurity field, including relevant industry certifications.
- In lieu of a degree, two (2) years of experience in a related technology field and relevant industry certifications are required.
- Two (2) or more years of experience in a threat analyst role.
- A minimum of two (2) years of experience with OSINT and threat hunting.
- A minimum of one (1) year of experience using Splunk and/or other SIEM technologies.
- Demonstrated expertise in intelligence tradecraft, the intelligence lifecycle, common threat modeling frameworks: MITRE ATT&CK, Diamond Model, PEAK, Cyber Kill Chain, D3F3ND
. - Experience using Threat Intelligence tools and processes necessary to collect information…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).