eTeam
Job Title: Threat Intelligence Analyst
Location: Miami, FL / Charlotte, NC / Raleigh, NC and Tampa, FL
Duration: 12 Months
Job Summary:
We are seeking a proactive and highly skilled
Threat Intelligence Analyst
to support the identification, tracking, and analysis of cyber threats. This role will play a critical part in delivering actionable intelligence, enabling the organization to detect, prevent, and respond to security threats more effectively. The ideal candidate has a strong understanding of cyber threat actor tactics, techniques, and procedures (TTPs), and can transform complex technical data into strategic intelligence.
Key Responsibilities: Collect, analyze, and disseminate threat intelligence from internal telemetry and external sources (OSINT, commercial feeds, ISACs, etc.). Monitor for emerging threats including APT activity, malware, ransomware, phishing, zero-days, and infrastructure abuse. Create detailed threat reports, actor profiles, risk assessments, and briefings for both technical and executive stakeholders. Leverage tools such as MISP, Anomali, Recorded Future, ThreatConnect, and others to aggregate and enrich threat indicators. Collaborate with SOC, red teams, vulnerability management, and incident response to support investigations and enhance detection capabilities. Map findings to industry-standard frameworks like MITRE ATT&CK, Kill Chain, and the Diamond Model. Maintain and manage Indicators of Compromise (IOCs), TTPs, and threat signatures. Participate in intelligence-sharing communities and maintain knowledge of global threat trends. Required Qualifications:
Bachelor's degree in Cybersecurity, Computer Science, Information Security, Intelligence Studies, or a related field. 3+ years of experience in cyber threat intelligence, security operations, or incident response. Strong analytical skills and deep understanding of attacker behavior, malware analysis, and threat actor attribution. Familiarity with STIX/TAXII, JSON, YARA, and SIEM platforms (e.g., Splunk, QRadar, or ELK). Working knowledge of threat Client tools (e.g., MISP, Maltego, Shodan, VirusTotal, and various TIPs). Solid grasp of IOCs (hashes, IPs, domains), TTPs, and threat modeling. Preferred Skills & Certifications:
Certifications such as
GCTI ,
CTIA ,
CEH ,
GCIA ,
OSINT Practitioner , or
CISSP . Scripting knowledge (Python preferred) for automating enrichment and correlation. Experience in sectors like finance, healthcare, government, or energy is a plus. Familiarity with geopolitical risk and its cyber threat implications.
We are seeking a proactive and highly skilled
Threat Intelligence Analyst
to support the identification, tracking, and analysis of cyber threats. This role will play a critical part in delivering actionable intelligence, enabling the organization to detect, prevent, and respond to security threats more effectively. The ideal candidate has a strong understanding of cyber threat actor tactics, techniques, and procedures (TTPs), and can transform complex technical data into strategic intelligence.
Key Responsibilities: Collect, analyze, and disseminate threat intelligence from internal telemetry and external sources (OSINT, commercial feeds, ISACs, etc.). Monitor for emerging threats including APT activity, malware, ransomware, phishing, zero-days, and infrastructure abuse. Create detailed threat reports, actor profiles, risk assessments, and briefings for both technical and executive stakeholders. Leverage tools such as MISP, Anomali, Recorded Future, ThreatConnect, and others to aggregate and enrich threat indicators. Collaborate with SOC, red teams, vulnerability management, and incident response to support investigations and enhance detection capabilities. Map findings to industry-standard frameworks like MITRE ATT&CK, Kill Chain, and the Diamond Model. Maintain and manage Indicators of Compromise (IOCs), TTPs, and threat signatures. Participate in intelligence-sharing communities and maintain knowledge of global threat trends. Required Qualifications:
Bachelor's degree in Cybersecurity, Computer Science, Information Security, Intelligence Studies, or a related field. 3+ years of experience in cyber threat intelligence, security operations, or incident response. Strong analytical skills and deep understanding of attacker behavior, malware analysis, and threat actor attribution. Familiarity with STIX/TAXII, JSON, YARA, and SIEM platforms (e.g., Splunk, QRadar, or ELK). Working knowledge of threat Client tools (e.g., MISP, Maltego, Shodan, VirusTotal, and various TIPs). Solid grasp of IOCs (hashes, IPs, domains), TTPs, and threat modeling. Preferred Skills & Certifications:
Certifications such as
GCTI ,
CTIA ,
CEH ,
GCIA ,
OSINT Practitioner , or
CISSP . Scripting knowledge (Python preferred) for automating enrichment and correlation. Experience in sectors like finance, healthcare, government, or energy is a plus. Familiarity with geopolitical risk and its cyber threat implications.