Threat Analyst
Listed on 2026-02-07
-
IT/Tech
Cybersecurity, Information Security
We are seeking a talented Cyber Threat Intelligence Analyst to gather, analyze, and report on critical cyber threat data. The successful candidate will conduct research and produce intelligence on cyber defense, technology, threat actors, geopolitical factors, and economic conditions. This role will collaborate with industry specialists and internal analysts to develop and maintain both short- and long-term research projects. Additionally, the analyst will present findings through briefings and external engagements, providing valuable intelligence to stakeholders at various levels.
Key Responsibilities
Discover, identify, and report regularly on significant cyber threats and risks to businesses, governments, and other organizations, focusing on cyber threat actors and groups from various global regions.
Research and write reports on zero-day vulnerabilities, including recommended mitigations and remediations.
Develop and produce intelligence reports centered on complex fraud events, cyber threats, and emerging trends.
Analyze cyber threat actors, groups, and events, and report on their tactics, techniques, and procedures (TTPs), motivations, sponsor ships, and influencing factors.
Produce high-level strategic intelligence reports focusing on industry trends, cybersecurity threats, complex geopolitical events, and related impacts.
Contribute to the drafting and dissemination of finished tactical and operational threat intelligence products, including reports and briefings.
Assess the likelihood of emerging threats impacting the organization and identify existing gaps or weaknesses.
Provide input and requirements for influencing threat mitigation strategies.
Develop documentation to support response processes and procedures.
Manage and integrate intelligence/data from vendor, consortium, and law enforcement partners to develop actionable intelligence.
Analyze internal risk and security controls to identify weaknesses and recommend improvements.
Provide ongoing threat intelligence support to cybersecurity teams during security incidents.
Maintain, develop, and continuously evaluate cyber threat intelligence sources to increase effectiveness and timeliness.
Respond to client requests for information (RFIs) and participate in the creation of company threat assessments.
Interact with executives and stakeholders in both verbal and written forms, accurately conveying complex threat data in non-technical terms, including risk impact, likelihood, containment, remediation activities, and actor TTPs.
Required Qualifications
Minimum of [X] years of experience in cyber threat intelligence, cybersecurity, or a related field.
Skills:
Strong ability to analyze and interpret cyber threat data, vulnerabilities, and trends.
Deep understanding of cyber threat actors, their tactics, techniques, and procedures (TTPs).
Experience in researching and producing high-quality intelligence reports for tactical and strategic decision-making.
Skills:
Exceptional written and verbal communication skills with the ability to convey complex information to both technical and non-technical stakeholders.
Familiarity with cyber threat intelligence tools, threat feeds, and analysis platforms.
Knowledge and experience with identifying, reporting, and mitigating zero-day vulnerabilities.
Preferred Qualifications
Experience:
Previous experience in the financial services, healthcare, or government sectors.
Skills:
Familiarity with cybersecurity tools such as SIEM, IDS/IPS, firewalls, and threat intelligence platforms.
Certifications:
Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM).
Understanding of global geopolitical events and their impact on cybersecurity.
Certifications
Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM) (preferred).
Certified Cyber Threat Intelligence Analyst (CCTIA) is a plus.
#J-18808-Ljbffr(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).