TEKsystems
Cybersecurity Threat Intelligence Analyst
TEKsystems, Anaheim, California, United States, 92808
Cybersecurity Threat Intelligence Analyst
Join to apply for the
Cybersecurity Threat Intelligence Analyst
role at
TEKsystems . The cybersecurity threat intelligence analyst is a key role supporting the information security program. The analyst monitors application, host, and network threats, including external threat actors and rogue insiders. They work closely with internal technical teams, business units, and external entities such as law enforcement and government agencies. The analyst conducts in-depth research, documents threats, assesses risks, and shares information with relevant stakeholders. They identify patterns and trends, participate in simulation exercises, and communicate threat intelligence effectively to technical and non-technical audiences. Essential Responsibilities
Research current and emerging threats. Track threat actor infrastructure and malware families. Utilize frameworks like MITRE ATT&CK. Correlate threat sources and distill actionable intelligence. Automate threat analysis processes where possible. Hunt for exposures and incidents. Assess and rate threat indicators. Document threats in clear reports. Advise stakeholders and recommend actions. Participate in threat hunting exercises. Implement deception techniques. Work with technical teams to address vulnerabilities. Promote cybersecurity policies across business units. Participate in collaborative threat analysis meetings. Stay updated on security threats and mitigations. Motivate business units to adopt security controls. Support leadership during security incidents. Perform additional duties as assigned. Skills and Experience
Excellent communication skills. Knowledge of adversary TTPs, MITRE, CVSS, OSINT, deception techniques. Experience with SIEM, IDS/IPS, threat platforms, SOAR. Ability to analyze logs, malware, vulnerabilities. Threat hunting and incident response experience. Proficiency in Python, PowerShell, Bash. Ability to work independently and as part of a team. Qualifications
High School Diploma required; Bachelor's preferred. CISSP, GCTI, GCFE, GCIH, GREM, OSCP certifications preferred. 5-7 years cybersecurity experience, including 3-5 years in threat intelligence or incident response. Additional Information
Location: Anaheim, CA (hybrid). Pay: $70-$85/hr. Application deadline: June 17, 2025. Benefits include health coverage, 401(k), life insurance, PTO, and more.
#J-18808-Ljbffr
Join to apply for the
Cybersecurity Threat Intelligence Analyst
role at
TEKsystems . The cybersecurity threat intelligence analyst is a key role supporting the information security program. The analyst monitors application, host, and network threats, including external threat actors and rogue insiders. They work closely with internal technical teams, business units, and external entities such as law enforcement and government agencies. The analyst conducts in-depth research, documents threats, assesses risks, and shares information with relevant stakeholders. They identify patterns and trends, participate in simulation exercises, and communicate threat intelligence effectively to technical and non-technical audiences. Essential Responsibilities
Research current and emerging threats. Track threat actor infrastructure and malware families. Utilize frameworks like MITRE ATT&CK. Correlate threat sources and distill actionable intelligence. Automate threat analysis processes where possible. Hunt for exposures and incidents. Assess and rate threat indicators. Document threats in clear reports. Advise stakeholders and recommend actions. Participate in threat hunting exercises. Implement deception techniques. Work with technical teams to address vulnerabilities. Promote cybersecurity policies across business units. Participate in collaborative threat analysis meetings. Stay updated on security threats and mitigations. Motivate business units to adopt security controls. Support leadership during security incidents. Perform additional duties as assigned. Skills and Experience
Excellent communication skills. Knowledge of adversary TTPs, MITRE, CVSS, OSINT, deception techniques. Experience with SIEM, IDS/IPS, threat platforms, SOAR. Ability to analyze logs, malware, vulnerabilities. Threat hunting and incident response experience. Proficiency in Python, PowerShell, Bash. Ability to work independently and as part of a team. Qualifications
High School Diploma required; Bachelor's preferred. CISSP, GCTI, GCFE, GCIH, GREM, OSCP certifications preferred. 5-7 years cybersecurity experience, including 3-5 years in threat intelligence or incident response. Additional Information
Location: Anaheim, CA (hybrid). Pay: $70-$85/hr. Application deadline: June 17, 2025. Benefits include health coverage, 401(k), life insurance, PTO, and more.
#J-18808-Ljbffr