Overview
Remote
On Site
Hybrid
Depends on Experience
Contract - Independent
Contract - W2
Skills
Cyber Security
Computer Science
Threat Analysis
Malware Analysis
Security+
Cloud Security
CISSP
Job Details
We are seeking a skilled Information Security Analyst (CTI) to join our Global Security Operations Center. This role collects, analyzes, and disseminates actionable threat intelligence to strengthen defensive posture, collaborating with SOC analysts, incident responders, vulnerability management, and leadership to reduce risk and enable proactive enterprise defense. Apply today to learn more!
Work model:
- Open to on-site, hybrid, and remote
What you will do:
- Collect and analyze threat intelligence from OSINT, commercial feeds, ISACs, and internal telemetry
- Create threat profiles of adversaries, campaigns, and malware families to support SOC operations and threat hunting
- Develop intelligence-driven hunting hypotheses and enrich investigations
- Respond to stakeholder RFIs across SOC, IR, vulnerability management, and leadership
- Build finished intelligence reports and assessments for technical and executive audiences
- Provide timely intelligence context during active incidents
- Track emerging threats, vulnerabilities, and geopolitical events relevant to the organization and industry
- Identify intelligence gaps, refine collection requirements, and enhance detection use cases
- Collaborate cross-functionally to reduce false positives and improve detection accuracy
What you will need to be successful:
- Threat analysis: Track, profile, and assess threat actors, campaigns, and TTPs
- Threat hunting support: Contribute hypotheses, indicators, and adversary playbooks; validate findings
- RFI handling: Collect, validate, and deliver tailored responses to stakeholders
- Intelligence tradecraft: Intelligence lifecycle understanding and analytic techniques
- Technical proficiency: Malware analysis fundamentals, network traffic analysis (PCAP, NetFlow), log analysis in SIEM platforms (Splunk, Microsoft Sentinel)
- Operational awareness: Contextualize threats to industry, geopolitical landscape, and organizational risk
- Communication: Cross-team engagement, executive briefings, high-quality deliverables
- Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or related field (or equivalent experience)
- 2 5 years in CTI, SOC, incident response, law enforcement, or military/civilian intelligence
- Familiarity with CTI platforms (Recorded Future, TruSTAR, Anomali, ThreatConnect, MISP)
- Exposure to sandboxing tools (Cuckoo, Joe Sandbox) and TIP/SIEM/XDR integrations
- Experience with MITRE ATT&CK, Diamond Model, and Cyber Kill Chain frameworks
- Threat Intelligence: GCTI, CCTIA, CTIA
- Technical Security: Security+, CySA+, CASP+, GCIA, GCIH, OSCP
- Advanced: CISSP, CISM
- Specialized: GREM, cloud security certifications (AWS, Azure, Google Cloud Platform)
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.