About the job
Join our team as a Cyber Threat Intelligence Analyst, where your expertise will be instrumental in translating threat, technology, and business insights into effective real-world protections.
Key Responsibilities
In this pivotal role, you will be responsible for collecting, validating, and enriching threat intelligence. You will draft clear and actionable reports and support our initiatives in detection, prevention, hardening, and incident readiness. Collaborating with seasoned CTI analysts, SOC/IR teams, detection engineering, offensive testers, and security architects, you will operationalize intelligence to ensure our clients make informed decisions on mitigations that effectively minimize threats to their operations.
Your Core Responsibilities Include:
Collection and Triage
- Maintain comprehensive asset and client inventories to align CTI activities with client priorities.
- Monitor various feeds, including open-source, commercial, and community sources, for relevant threat information.
- Validate and enrich Indicators of Compromise (IOCs) with contextual details such as first-seen, ASN, geo, and confidence levels.
- Document findings and escalate complex issues to senior analysts or engineers as needed.
Reporting and Communication
- Prepare concise situation updates, reports, advisories, and client-ready summaries at tactical, operational, and strategic levels.
- Maintain intelligence repositories with accurate tagging, TLP markings, confidence levels, and deduplication efforts.
Translating Priority Threats and TTPs
- Recommend implementations for MFA, geo/IP restrictions, and adjustments to mail filtering and configuration baselines.
- Identify actively exploited CVEs, track remediation progress, and suggest compensating controls when patching is delayed.
- Propose threat hunts, initial detection opportunities, and draft low-noise detection rules.
- Collaborate with red/purple teams by providing threat briefs, ATT&CK mappings, and supporting test data.
