Cyber Threat Intelligence Senior Analyst

Overview

Hybrid
Depends on Experience
Full Time
No Travel Required

Skills

"Cyber Threat Intelligence"
Analyst
"Threat hunting"
"threat data"

Job Details

As a CTI Sr. Analyst, you will play a critical role in identifying, analyzing, simulating, and reporting on cyber threats that could impact global operations. You will work closely with internal stakeholders and external partners to deliver timely, actionable intelligence that informs risk-based decision-making and enhances our cyber defense posture.

Key Responsibilities:

  • Lead the development and refinement of cyber threat intelligence processes and workflows.
  • Coordinate intelligence collection and dissemination across internal teams and external partners.
  • Assist with planning and execution of strategies for threat intelligence gathering aligned with organizational risk management goals and security objectives.
  • Mentor junior analysts and contribute to team development and knowledge sharing.
  • Collect, analyze, and correlate threat data from open-source, commercial, and government feeds.
  • Maintain and enhance threat intelligence platforms (TIPs), dashboards, and reporting tools.
  • Develop and maintain threat actor profiles, TTP mappings, and intelligence reports using frameworks like MITRE ATT&CK and the Diamond Model.
  • Provide technical enrichment for alerts, incidents, and vulnerabilities through contextual threat intelligence.
  • Collaborate with SOC, incident response, vulnerability management, and engineering teams to align intelligence efforts with operational needs.
  • Liaise with IT, OT, and business units to ensure threat intelligence gathering and dissemination benefits the enterprise and industrial environments.
  • Serve as a liaison to external intelligence-sharing communities, ISACs, and law enforcement partners.
  • Communicate threat trends and risk insights to business stakeholders through executive briefings and strategic reports.
  • Support compliance, audit, and regulatory reporting requirements with timely and accurate intelligence data.

Your Skills and Expertise:

To set you up for success in this role from day one, requires (at a minimum) the following qualifications:

  • Bachelor s degree in Cybersecurity, Computer Science, Intelligence Studies, or a related field completed and verified prior to start from an accredited institution.
  • 5+ years of experience in cyber threat intelligence, threat hunting, or related cybersecurity roles.

Additional qualifications that could help you succeed even further in this role include:

  • Experience working in a global enterprise or government/military intelligence environment.
  • Certifications such as GCTI, CTIA, and CISSP are highly valued.
  • Strong understanding of cyber threat intelligence lifecycle and frameworks (e.g., MITRE ATT&CK, Diamond Model, Kill Chain).
  • Experience with threat intelligence platforms (TIPs), STIX/TAXII, and integrating intelligence into SOC (via SIEM) and IR workflows
  • Excellent analytical, writing, and presentation skills.
  • Ability to synthesize complex technical data into clear, actionable insights.
  • Familiarity with malware analysis, phishing campaigns, and APT tracking is a plus.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.