About this role
Threat intelligence analyst role focusing on gathering and analyzing intelligence data to identify potential threats to the bank; manages IOC lifecycle and collaborates with SOC and engineering teams to translate intel into detections and responses.
Key Responsibilities
- Independently collect and analyze intelligence data from various sources
- identify relevant information, and report findings to senior analysts and leaders
- Define and maintain indicator quality standards and governance
- Monitor the IOC lifecycle including intake, normalization, enrichment, scoring, dissemination, and retirement
- Operationalize IOCs by partnering with SOC/Hunt/Detection Engineering to convert intelligence into detections, blocklists, and response actions
Technical Overview
Experience with Open-Source Intelligence, Threat Intelligence Platform, IOC management, and threat intel integration with security controls; governance and telemetry-based validation are emphasized.
Ideal Candidate
The ideal candidate is a mid-level threat intelligence analyst with 3+ years of experience in cyber threat intelligence, solid OSINT and TIP tooling, and the ability to operationalize IOC data into detections. Strong communication and collaboration across a cyber defense team are essential.
Must-Have Skills
Bachelor's degree3+ years relevant cyber threat intelligence experienceExperience analyzing cyber-attack stages (reconnaissancescanningenumerationaccess escalationprivilege escalationexploitationobfuscation)Intermediate understanding of cyber-attack stagesOpen-Source Intelligence (OSINT)Threat Intelligence Platform (TIP)Indicator of Compromise (IOC) lifecycle
Nice-to-Have Skills
Understanding of different threat actorsIndustry recognized cybersecurity certificationsTechnical understanding of networking and routingExperience evaluating large data setsDesigning or operating IOC processing pipelinesIntegrating intelligence with SIEM and EDR workflowsIOC governance and measurementUnderstanding financial crimes
Tools & Platforms
Open-Source IntelligenceThreat Intelligence PlatformSecurity Information and Event ManagementEndpoint Detection and Response
Required Skills
Bachelor's degree3+ years relevant cyber threat intelligence experienceOSINTTIPIOC lifecycleDarkwebmalware research toolsCybersecurity Operations CenterDetection Engineeringinformation sharing initiativesgovernancetelemetryfalse positivestacticstechniquesand proceduresrisk and regulatory standardsblocklistscorrelation logicthreat intelligence briefings
Hard Skills
Open-Source Intelligence (OSINT)OSINTThreat Intelligence Platform (TIP)TIPIndicator of Compromise (IOC)IOCIOC lifecycleDarkwebmalware research toolsCybersecurity Operations CenterDetection Engineeringthreat intelligence briefingsintelligence sharing initiativesinformation sharing groupsindustry groupstacticstechniquesand procedurestelemetryfalse positivesgovernancerisk and regulatory standardsblocklistscorrelation logic
Soft Skills
strong communicationcollaborationanalytical thinkingproblem-solvingattention to detailstakeholder engagementprioritization
Certifications
Preferred
Industry recognized cybersecurity certifications
Keywords for Your Resume
Open-Source Intelligence (OSINT)OSINTThreat Intelligence Platform (TIP)TIPIndicator of Compromise (IOC)IOCIOC lifecycleDarkwebmalware research toolsCybersecurity Operations CenterDetection Engineeringthreat intelligence briefingsintelligence sharing initiativesinformation sharing groupsindustry groupstacticstechniquesand procedurestelemetryfalse positivesgovernancerisk and regulatory standardsblocklistscorrelation logicThreat Intelligence Platform
Deal Breakers
Lack of Bachelor's degree, Less than 3 years in threat intelligence, No experience with OSINT or TIP
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile