The Threat Intelligence Analyst is a core member of the Threat Intelligence Center, responsible for identifying, analyzing, and reporting on cyber threats targeting national critical infrastructure and enterprise systems. This role focuses on intrusion analysis, malware reverse engineering, and threat actor tracking across the surface, deep, and dark web. The analyst will transform raw technical data into actionable intelligence to support investigations, incident response, and proactive defense strategies.
Responsibilities
Intrusion Analysis
Analyze network telemetry, endpoint logs, and threat data to identify malicious activity and intrusion attempts.
Correlate indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) with threat actor campaigns.
Support incident response teams with threat context, attribution, and post-incident intelligence reporting.
Develop detection logic using Sigma, Snort, and custom scripts to identify emerging threats.
Malware Analysis & Reverse Engineering
Perform static and dynamic analysis of malware samples using tools such as Ghidra, IDA Pro, x64dbg, and Cuckoo Sandbox.
Reverse engineer obfuscated binaries and scripts to extract payloads, persistence mechanisms, and C2 infrastructure.
Create YARA rules and behavioral signatures to detect malware variants and families.
Maintain a malware repository and contribute to threat hunting and detection engineering efforts.
Surface, Deep, and Dark Web Intelligence Collection
Monitor underground forums, encrypted messaging platforms, and marketplaces for threat actor activity, data leaks, and exploit development.
Use TOR, I2P, and specialized tooling to collect intelligence on cybercriminal operations and APT chatter.
Identify and report on targeted threats, credential dumps, and mentions of organizational assets.
Collaborate with law enforcement and intelligence-sharing communities when necessary.
Threat Intelligence Operations
Produce high-quality intelligence products including technical reports, threat assessments, and adversary profiles.
Manage and optimize threat intelligence platforms (TIPs) and integrate feeds into SIEM and SOAR systems.
Develop and refine threat models using frameworks such as MITRE ATT&CK, Diamond Model, and the Cyber Kill Chain.
Build and manage SIEM use cases based on threat intelligence findings.
Qualifications
Required Skills & Experience
Minimum 7 years of experience in cyber threat intelligence, malware analysis, or intrusion detection.
Strong understanding of threat actor methodologies, APT groups, and cybercrime ecosystems.
Proficiency in malware analysis tools (Ghidra, IDA Pro, Cuckoo, etc.) and packet analysis tools (Wireshark, tcpdump).
Experience with threat intelligence platforms (MISP, ThreatConnect, Recorded Future) and SIEMs (Splunk, QRadar, Elastic).
Hands-on experience with scripting languages (Python, PowerShell, Bash) for automation and enrichment.
Familiarity with STIX/TAXII, YARA, OpenIOC, and other intelligence sharing formats.
Preferred Qualifications
Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).
Certifications: GREM, GCTI, GCIH, CISSP, or equivalent.
Experience in large-scale security operations (enterprise, military, or government).
Strong analytical and investigative skills with the ability to synthesize complex data into actionable insights.
Experience integrating threat intelligence into SOC workflows and detection pipelines.
Searching, interviewing and hiring are all part of the professional life. The TALENTMATE Portal idea is to fill and help professionals doing one of them by bringing together the requisites under One Roof. Whether you're hunting for your Next Job Opportunity or Looking for Potential Employers, we're here to lend you a Helping Hand.
Disclaimer: talentmate.com is only a platform to bring jobseekers & employers together.
Applicants
are
advised to research the bonafides of the prospective employer independently. We do NOT
endorse any
requests for money payments and strictly advice against sharing personal or bank related
information. We
also recommend you visit Security Advice for more information. If you suspect any fraud
or
malpractice,
email us at abuse@talentmate.com.
You have successfully saved for this job. Please check
saved
jobs
list
Applied
You have successfully applied for this job. Please check
applied
jobs list
Do you want to share the
link?
Please click any of the below options to share the job
details.
Report this job
Success
Successfully updated
Success
Successfully updated
Thank you
Reported Successfully.
Copied
This job link has been copied to clipboard!
Apply Job
Upload your Profile Picture
Accepted Formats: jpg, png
Upto 2MB in size
Your application for Threat Intelligence Analyst CPX
has been successfully submitted!
To increase your chances of getting shortlisted, we recommend completing your profile.
Employers prioritize candidates with full profiles, and a completed profile could set you apart in the
selection process.
Why complete your profile?
Higher Visibility: Complete profiles are more likely to be viewed by employers.
Better Match: Showcase your skills and experience to improve your fit.
Stand Out: Highlight your full potential to make a stronger impression.
Complete your profile now to give your application the best chance!