Enable job alerts via email!

Cyber Threat Intelligence (CTI) Analyst

Shtudy

San Francisco (CA)

Remote

USD 80,000 - 120,000

Full time

26 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is on the lookout for a Cyber Threat Intelligence Analyst to enhance their security team. In this fully remote role, you will be at the forefront of identifying and analyzing cyber threats, producing actionable intelligence reports, and collaborating with various teams to bolster the organization's security posture. Your expertise will play a vital role in monitoring threat trends and supporting incident response efforts. This is an exciting opportunity to make a significant impact in cybersecurity while working with cutting-edge tools and frameworks in a supportive environment.

Qualifications

  • 3+ years in cybersecurity, with 1-2 years in a CTI role.
  • Strong grasp of the cyber threat landscape and APT groups.

Responsibilities

  • Analyze and report on current and emerging cyber threats.
  • Collaborate with SOC and IR teams for threat detection.

Skills

Cybersecurity
Threat Intelligence Analysis
Communication Skills
Malware Analysis
Scripting (Python, PowerShell)

Education

Relevant Certifications (GCTI, GCIA, CEH, CISSP)

Tools

Threat Intelligence Platforms (TIPs)
SIEMs
SOARs
VirusTotal
Shodan
ThreatFox

Job description

San Francisco, United States | Posted on 04/16/2025

Location: 100% Remote (USA)

Job Type: Full-Time

Department: Information Security / Cybersecurity

Position Overview

A top leading U.S tech company is seeking a Cyber Threat Intelligence (CTI) Analyst to join a growing security team. The successful candidate will be responsible for identifying, analysing, and reporting on current and emerging cyber threats. This role plays a crucial part in enhancing our threat detection capabilities, supporting incident response, and improving our overall security posture.

Key Responsibilities

Collect, analyse, and disseminate threat intelligence from open-source, commercial, and proprietary sources.

Monitor and evaluate cyber threat trends, tactics, techniques, and procedures (TTPs).

Produce actionable intelligence reports, threat briefings, and alerts tailored to technical and non-technical audiences.

Support the detection, analysis, and response to cyber threats in collaboration with SOC, IR, and vulnerability management teams.

Track threat actors and campaigns relevant to the organization’s risk profile and industry sector.

Perform malware analysis, phishing campaign tracking, and IOC enrichment.

Maintain CTI platforms, threat feeds, and threat intelligence tools.

Provide strategic intelligence to inform risk assessments and security program planning.

Collaborate with law enforcement, Information Sharing and Analysis Centres (ISACs), and industry threat-sharing communities.

Requirements

3+ years of experience in cybersecurity with at least 1-2 years in a CTI role.

Strong understanding of the cyber threat landscape, APT groups, and cybercrime.

Familiarity with MITRE ATT&CK, Diamond Model, and Kill Chain frameworks.

Experience working with threat intelligence platforms (TIPs), SIEMs, and SOARs.

Knowledge of IOCs, TTPs, and IOC enrichment tools (VirusTotal, Shodan, ThreatFox, etc.).

Excellent written and verbal communication skills.

Preferred:

Experience supporting threat hunting and incident response efforts.

Familiarity with scripting languages (Python, PowerShell) and automation tools.

Knowledge of cloud security (AWS, Azure, GCP) threat vectors.

Relevant certifications such as GCTI, GCIA, CEH, CISSP, or equivalent.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.