Job Descritpion of Cyber Threat Intelligence Analyst
4 to 6 Years Relevant Experience
Roles & Responsibilities
- Effectively communicate cyber threat intelligence and analysis in both written reports and executive briefings tailored for senior-level stakeholders.
- Analyze threat actor tactics, techniques, and procedures (TTPs) using established frameworks such as the Cyber Kill Chain, Diamond Model, and MITRE ATT&CK.
- Develop deep subject-matter expertise and identify complex threat actor patterns to provide actionable intelligence on current and emerging threats.
- Create analytical threat models relevant to the financial services sector and other high-risk industries.
- Identify intelligence gaps and generate requests for information (RFIs) to support ongoing threat analysis.
- Work closely with internal stakeholders and external entities (ISACs, law enforcement, intelligence agencies, etc.) to enhance threat visibility and response.
- Conduct threat hunting and retroactive hunting using known Indicators of Compromise (IOCs).
- Deliver high-quality finished intelligence reports to business units, including strategic and tactical insights.
- Participate in the development of alerting rules and assist in improving security monitoring capabilities.
- Support senior leadership by aligning threat intelligence with organizational risk and critical asset priorities.
- Conduct internal briefings across various business and security teams.
Required Skills & Experience
- 4 to 6 years of relevant cyber threat intelligence experience.
- Strong experience in analyzing cyber threat data and generating relevant recommendations.
- In-depth understanding of:
- MITRE ATT&CK, Cyber Kill Chain, Diamond Model methodologies.
- Threat Intelligence Platforms (TIPs) such as Anomali, Recorded Future, ThreatConnect, etc.
- SIEM platforms like Splunk, and tools such as Maltego, XSOAR, OSINT aggregators.
- Strong knowledge of:
- Networking concepts and enterprise infrastructure.
- STIX/TAXII standards.
- Intrusion Detection/Prevention Systems (IDS/IPS) and load balancing technologies.
- Experience with:
- Cloud environments (e.g., AWS, Azure).
- Malware analysis and network-based forensic tools.
- Both qualitative and quantitative intelligence analysis from diverse sources.
Preferred Qualifications
- SANS GCTI certification (or equivalent).
- Familiarity with threat actors targeting the US financial sector (Nation-State, Cybercrime, Hacktivists, etc.).
- Knowledge of security priorities and TTPs associated with sector-specific threats.
Required Skills for Cyber Threat Intelligence Analyst Job
- GCTI
- Threat Intelligence
- Threat Intel Platform
Our Hiring Process
- Screening (HR Round)
- Technical Round 1
- Technical Round 2
- Final HR Round