Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Akkodis
CyberThreatIntelligenceAnalyst Akkodis are currently working in partnership with a leading service provider to recruit a CyberThreatIntelligenceAnalyst to join a leading Cyber Defence Team and play a pivotal role in providing actionable technical intelligence to detection engineers, threat hunters and security operations. This role … offers a highly competitive salary and the opportunity for remote working. The Role As a CyberThreatIntelligenceAnalyst you will support the rest of the Cyber Defence engineering team in regard to the roadmap and what to focus on. You will share intel to help them understand what's emerging as well as what … advanced persistent threat actors are leveraging to compromise systems. You will work directly across all areas of Cyber Defence to produce bespoke and technical intelligence across Tactical, Strategic, and Operational intelligence. The Responsibilities Conduct in-depth analysis of threat groups, their capabilities, motivations, and tactics A strong understanding of threats posed Articulate complex concepts to various More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
OSAAVA Services
Position Overview: We are seeking a skilled CyberThreatIntelligence (CTI) Analyst with a focus on adversary Tactics, Techniques, and Procedures (TTPs) to support cyber defense operations in a mission-critical DoD environment. This position requires strong analytical abilities to assess and track cyber adversaries, identify trends and attack patterns, and provide actionable intelligence for both defensive and proactive cyber operations. As a member of a multidisciplinary threatintelligence team, you will work closely with cyber defenders, incident responders, and stakeholders to enrich detection capabilities and enhance the organization's overall cybersecurity posture. Key Responsibilities: Analyze, document, and track adversary TTPs using frameworks like MITRE ATT&CK, and integrate … findings into threat detection strategies. Produce detailed cyberthreatintelligence reports, briefings, and technical advisories for internal and external stakeholders. Fuse data from multiple sources (e.g., open-source intel, classified feeds, threat hunting) to provide a holistic threat picture. Collaborate with SOC and Incident Response teams to inform detections and investigations based on threatMore ❯
ManTech seeks a motivated, career and customer-oriented Cybersecurity ThreatIntelligenceAnalyst to join our team in the DC, Maryland, and Virginia (DMV) area. In this role you will support the design, development, implementation, and improvement of the enterprise Cybersecurity ThreatIntelligence (CTI) program. Duties may include: monitoring open source intelligence feeds, sources, websites … etc., to identify emerging and zero-day threats and potential risks to enterprise security; compiling and synthesizing reports, analyzing, e.g., threat vectors and method of attack via MITRE ATT&CK and the cyber kill chain; composing emails and strategic communications to inform subscribers and stakeholders of emerging risks, etc. The Cyber Security ThreatIntelligenceAnalyst … posture of the DHS enterprise. Responsibilities include, but are not limited to: Collaborate with incident response teams to investigate, analyze, and remediate identified threats; Stay current with the latest cyberthreatintelligence, trends, and technologies Identify and assess the capabilities and activities of cyber criminals or foreign intelligence entities; design and administer procedures in the More ❯
Responsibilities & Qualifications TEAM SUMMARY Responsible for monitoring and analyzing external cyberthreat data to provide insights and actionable intelligence about potential cyber threats. This team triages information collected from different threatintelligence sources, including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to a government … agency's systems. This team supports enhancing the overall cybersecurity posture of an organization by delivering timely, relevant, information to stakeholders. ACTIVITIES & RESPONSIBILITIES Continuously monitor threatintelligence platforms, feeds, and cybersecurity news to detect emerging threats. Conduct deep-dive investigations into alerts generated by Splunk or other monitoring tools. Develop and maintain threatintelligence reports, dashboards … and threat models. Collaborate with SOC, IR, and vulnerability management teams to contextualize and act on threat intelligence. Support cyberthreat hunting initiatives by leveraging threatintelligence indicators and hypotheses. Participate in government-led cyber exercises or red/blue team simulations. Provide regular briefings and updates to leadership and stakeholders on emerging More ❯
Position Summary: We are seeking an experienced CyberThreatIntelligenceAnalyst to join our cybersecurity team in Huntsville, AL. This mid-level position requires a proactive professional with strong analytical and investigative skills, responsible for identifying, assessing, and mitigating cyber threats in a dynamic and mission-critical environment. Key Responsibilities: Monitor and analyze computer networks … for indicators of compromise and advanced persistent threats. Investigate cybersecurity breaches and incidents, documenting findings and assessing impact. Conduct threatintelligence gathering, analysis, and reporting using open-source, commercial, and proprietary tools. Work with SOC and incident response teams to support real-time cyber defense operations. Identify and analyze malicious activity, trends, and threat actor behavior … statistical correlation, and file signature reviews. Support deployable Incident Response Teams (IRTs) during investigations and incident handling. Required Qualifications: 8+ years of experience in cybersecurity, with a focus on threatintelligence, incident response, or network defense. Hands-on experience with Splunk Enterprise Security for threat detection and correlation. Solid understanding of cyberthreat landscapes, TTPs More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
OSAAVA Services
Position Overview: We are seeking a skilled CyberThreatIntelligence (CTI) Analyst with a focus on adversary Tactics, Techniques, and Procedures (TTPs) to support cyber defense operations in a mission-critical DoD environment. This position requires strong analytical abilities to assess and track cyber adversaries, identify trends and attack patterns, and provide actionable intelligence for both defensive and proactive cyber operations. As a member of a multidisciplinary threatintelligence team, you will work closely with cyber defenders, incident responders, and stakeholders to enrich detection capabilities and enhance the organization's overall cybersecurity posture. Key Responsibilities: Analyze, document, and track adversary TTPs using frameworks like MITRE ATT&CK, and integrate … findings into threat detection strategies. Produce detailed cyberthreatintelligence reports, briefings, and technical advisories for internal and external stakeholders. Fuse data from multiple sources (e.g., open-source intel, classified feeds, threat hunting) to provide a holistic threat picture. Collaborate with SOC and Incident Response teams to inform detections and investigations based on threatMore ❯
Job Number: R CyberThreatIntelligenceAnalyst Key Role: Work as a member of a threatintelligence team responsible for understanding how emerging cyber threats impact the client organization while c ond ucting highly detail-oriented security threat analysis and working with clients to validate and characterize threats. Support incident detection, response … provide input on new detection strategies and remediation guidance. Form accurate and precise analysis and escalate it to appropriate teammates or internal teams for additional assistance or review. Provide intelligence context to support the fine-tuning of signatures. Basic Qualifications: 8+ years of experience with cybersecurity 4+ years of experience c ond ucting threat research focused on nation … state, criminal, or malicious cyber activities Experience translating complex technical cyber events into a narrative format for technical and executive audiences Experience with the technical capabilities and limitations of the internet and online technologies, including collaborative internet tools such as so cia l networking sites, blogs, and microblogs, and internet mapping tools Experience with computer network protocols and More ❯
Job title: CyberThreatIntelligenceAnalyst Location: Preston, Frimley or Filton We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role. Salary: Circa £45,000 depending on experience What you’ll be doing: Performing threat research to identify threats relevant to BAE Systems … including collecting, processing, and disseminating actionable, high fidelity threatintelligence Assisting with the identification of current tactics, techniques, & procedures (TTPs) and Indicators of Compromise (IOC) Uses analysis techniques useful for investigating suspected attacks and perform intelligence tasking Will develop and maintain knowledge of cyber security threats, analyst toolsets and relevant activity group tactics, techniques, and … procedures (TTPs) Your skills and experiences: Essential: An understanding of CyberThreatIntelligence techniques and best practice Knowledge of cyberthreat landscape, current affairs, and geopolitics, including activity groups and how to apply this knowledge within an operational environment Desirable: Knowledge of the types of threat actors and how they operate Knowledge of network More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
CyberThreatIntelligenceAnalyst Location: Huntsville, AL Work Type: Onsite Remote Work: No Job Description Work as a member of a threatintelligence team responsible for understanding how emerging cyber threats impact the client organization while conducting highly detail-oriented security threat analysis and working with clients to validate and characterize threats. … provide input on new detection strategies and remediation guidance. Form accurate and precise analysis and escalate it to appropriate teammates or internal teams for additional assistance or review. Provide intelligence context to support the fine-tuning of signatures. Qualifications 8+ years of experience with cybersecurity 4+ years of experience with conducting threat research focused on nation-state, criminal … or malicious Cyber activities Experience with translating complex technical cyber events into a narrative format for technical and executive audiences Experience with the technical capabilities and limitations of the internet and online technologies, including collaborative internet tools, such as social networking sites, blogs and microblogs, and internet mapping tools Experience with computer network protocols and operations Knowledge of More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
La Fosse
CyberThreatIntelligenceAnalyst We are helping a household name that impacts all of our lives to develop new cyber capabilities from the ground up. They're looking for a CyberThreatIntelligenceanalyst to help out with their Threat Intell function and keep them ahead of the curve when … it comes to threat management and security automation. This is a rare opportunity to join a large organisation and play a pivotal role in building new capabilities with no legacy systems in place and you'll have the chance to shape the future of their cybersecurity operations from the very beginning. We're looking for candidates with experience in … Threat management and modelling TTPs Cyberthreatintelligence tools and technologies. Staying up to date with new and emerging threats Details: Location: West Midlands – 2x a month on-site Salary: Up to £79,000 If you're interested in this exciting opportunity, please apply or send your CV to More ❯
Title: CyberThreatIntelligenceAnalyst Client: U.S. Army Location: Fort Belvoir, VA 22060 • Provides cyber risk and threat identification by proactively and continuously monitoring the internal and external landscape for relevant events, risks and threats related to malicious code, vulnerabilities and attacks. • Performs monitoring and analysis of threatintelligence monitoring tool services … mitigation TTPs for identified malicious logic within the customer's environment. • Maintains current knowledge of tools and best practices in advanced persistent threats. • Regularly develops and produces succinct written intelligence reports 706 constructed from technical analysis and collected threat information for ECMA internal consumers. • Contributes cyber security perspective to discussions and decisions regarding MITRE Telecommunication&CK for … Cloud. • Partners with peer cyber operations teams understand events and support technical analysis of malicious cyber security incidents. • Tracks potential threats associated with attempted intrusions and network and host-based attacks, and coordinates incident response efforts with cyber security teams. Minimum Qualifications: • Foundational Cloud Certification • Network and/or systems certification(s), such as Cisco CCNP or More ❯