×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Senior Threat Intelligence Analyst

Job in Kansas City, Jackson County, Missouri, 64101, USA
Listing for: TENEX.AI
Full Time position
Listed on 2026-02-03
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below

Location

Kansas City, MO SOC, Sarasota, FL HQ

Employment Type

Full time

Location Type

Hybrid

Department

Security Operations

Company

Summary:

TENEX.AI is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is comprised of industry experts with deep experience in cybersecurity, automation, and AI-driven solutions. We’re a fast growing startup backed by industry experts and top tier investor Andreessen Horowitz.

As an early employee, you’ll play a meaningful role in defining and building our culture. Get in on the ground floor. We’re a small but well-funded team that just raised a substantial round – joining now comes with limited risk and unlimited upside. We are rapidly growing and seeking top talent to join our mission of revolutionizing the cybersecurity landscape.

We are looking for an investigative Sr. Threat Intelligence Analyst to join our Cybersecurity team. You will be responsible for identifying, evaluating, and communicating threats to our organization. Your primary mission is to turn the "noise" of the global threat landscape into clear, actionable intelligence that our Security Operations Center (SOC) and leadership can use to protect our customers. You will also be instrumental in the building and development of our threat intelligence program, collaborating with various security functions, and proactively identifying and helping to mitigate risks.

Culture is one of the most important things —check out our culture deck ex.ai to experience how we champion it, valuing the unmatched collaboration and community of in-person work while offering flexibility for the best of the best.

The ideal candidate will be able to work onsite at our HQ based in Sarasota, FL (Tampa Metro Area) or Overland Park, KS (Kansas City Metro Area) location.

If you’re looking at this position and you are not located in either of our physical locations, we strongly recommend you consider accepting one of our lucrative relocation packages to our epic hubs in Sarasota, Florida (outside Tampa), or Overland Park in the Kansas City metro—where trailblazers redefine cybersecurity with 10x impact!

Core Responsibilities
  • The Intelligence Cycle: Execute all phases of the intelligence lifecycle: planning, collection, analysis, production, and dissemination.

  • Adversary Profiling: Track specific threat actors and groups. You will map their Tactics, Techniques, and Procedures (TTPs) using the MITRE ATT&CK framework to identify gaps in our current defenses.

  • Strategic Analysis: Monitor geopolitical events, industry trends, and the dark web to provide "big picture" briefings on how the threat landscape is evolving.

  • Tactical Support: Extract and validate technical Indicators of Compromise (IOCs) from malware reports and OSINT to ensure our block lists are high-fidelity and low-noise.

  • Threat Intelligence Collection: Assist in the proactive research, identification, and collection of threat intelligence from various sources, including open-source intelligence (OSINT), commercial feeds, and internal security data.

  • Reporting: Produce high-quality written reports, ranging from "Flash Alerts" for urgent threats to monthly blogs or executive summaries for leadership.

  • Vulnerability Intelligence: Monitor and analyze vulnerability disclosures and exploit trends to provide initial insights into potential risks.

  • Cross-Functional Collaboration: Act as a bridge between technical teams (Incident Response) and non-technical stakeholders, translating complex exploits into business risk.

Required Qualifications
  • Experience: 6+ years of experience in cybersecurity, with at least 4+ years specifically focused on threat intelligence or a closely related field (e.g., Security Operations Center (SOC) analysis).

  • Knowledge: Familiarity with the Intelligence Cycle, Threat frameworks and methodologies (e.g. MITRE ATT&CK, Diamond Model, Cyber Kill chain, Pyramid of Pain, STIX/TAXII).

  • Research

    Skills:

    Proficiency in OSINT and Commercial tools and techniques…

Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary