Logo
eTeam

Threat Intelligence Analysts

eTeam, New York, New York, us, 10261

Save Job

Job Title: Threat Intelligence Analysts Location: New York, NY - Boston, MA - Washington, D.C. - Atlanta, GA

Job Summary: As a Threat Intelligence Analyst, you will play a critical role in identifying, analyzing, and reporting on cyber threats that could impact the organization. You will gather and interpret intelligence from a variety of internal and external sources to proactively detect, assess, and mitigate potential threats to information systems, infrastructure, and assets.

Key Responsibilities: Collect, analyze, and interpret data from open-source intelligence (OSINT), dark web, and proprietary sources to identify emerging threats. Provide actionable intelligence to security operations teams, incident responders, and executive leadership. Monitor cyber threat trends, techniques, tactics, and procedures (TTPs) used by threat actors. Collaborate with internal teams (SOC, Incident Response, IT, Risk, etc.) and external partners (government agencies, ISACs, vendors) to share intelligence and improve threat detection. Create and maintain threat profiles, intelligence reports, and dashboards. Participate in threat hunting and incident investigations as needed. Recommend security controls and mitigation strategies based on threat analysis. Assist in building and maintaining threat intelligence platforms and databases. Ensure compliance with data privacy laws and organizational security policies.

Required Skills & Qualifications: Bachelor's degree in Cybersecurity, Information Security, Computer Science, or a related field (or equivalent experience). 2+ years of experience in cyber threat intelligence, threat hunting, or a related field. Strong knowledge of cyber threat actor tactics, techniques, and procedures (MITRE ATT&CK framework preferred). Familiarity with tools such as Threat Intelligence Platforms (TIPs), SIEM (e.g., Splunk), malware analysis tools, and OSINT tools. Proficiency in analyzing Indicators of Compromise (IOCs), TTPs, and threat feeds. Excellent written and verbal communication skills for producing clear and concise intelligence reports. Strong analytical and problem-solving abilities. Industry certifications such as GCTI, CEH, CISSP, or SANS certifications (e.g., FOR578) are a plus.

Preferred Qualifications: Experience working in a SOC or with incident response teams. Familiarity with regulatory frameworks such as NIST, ISO 27001, GDPR. Programming/scripting knowledge (Python, PowerShell, etc.) for automating threat intelligence tasks. Experience with STIX/TAXII protocols and threat sharing standards.