About this role
Senior Cyber Threat Intelligence Analyst to lead threat intel program, align with SOC/EVM, and produce actionable intelligence for security operations and leadership. This hybrid role supports five offices and requires collaboration across IT and leadership.
Key Responsibilities
- Collect threat intelligence from multiple sources and deliver tactical, operational, and strategic intelligence products
- Partner with Information Security leaders to align intelligence with security strategy
- Oversee internal and external sources for emerging threats, IOCs, and adversary TTPs
- Enhance SOC and EVM workflows with intelligence
- Produce intelligence reports, threat alerts, and executive-ready briefings
Technical Overview
Focus on threat intelligence collection and analysis, TIPs integration, OSINT sources, IOCs/TPPs, MITRE ATT&CK, threat modeling, and incident response playbooks to strengthen detection and response across the enterprise.
Ideal Candidate
The ideal candidate is a mid-to-senior threat intelligence professional with 3-5 years in cyber threat intelligence or security operations, able to translate threat data into actionable insights for SOC and leadership. They should have familiarity with MITRE ATT&CK, threat intel frameworks, and hands-on TIPs experience, with strong communication across technical and executive audiences.
Must-Have Skills
None listed
Nice-to-Have Skills
Familiarity with cyber threat intelligence frameworks (e.g.MITRE ATT&CKDiamond ModelCyber Kill Chain)3-5 years of experience in cyber threat intelligencesecurity operationsor related cybersecurity rolesHands-on experience with Threat Intelligence Platforms (TIPs) and integrating threat data into SOCincident responseand/or vulnerability management workflowsDemonstrated experience creating actionable reportsalertsand briefings for technical and executive audiencesProven cross-functional collaborator who improves shared intelligence processes and operational outcomesBachelor's degree in Intelligence StudiesInternational RelationsComputer ScienceInformation Technology/SecurityCybersecurityor related fieldRelevant certifications preferred (e.g.GCTICISSPGSECCEHCISMor equivalent)
Required Skills
Threat IntelligenceThreat Intelligence Platforms (TIPs)TIPsOSINTIndicators of Compromise (IOCs)IOCsadversary TTPsMITRE ATT&CKCyber Kill ChainDiamond ModelSOC workflowsVulnerability ManagementIncident ResponseThreat ReportsThreat AlertsThreat ModelingDetection LogicAdversary TrackingKnowledge ManagementExecutive-ready briefings
Hard Skills
Threat IntelligenceThreat Intelligence Platforms (TIPs)OSINTIndicators of Compromise (IOCs)adversary TTPsMITRE ATT&CKCyber Kill ChainDiamond ModelSOC workflowsThreat modelingThreat reportsThreat alertsIncident responseDetection logicAdversary tracking frameworksExecutive-ready briefingsKnowledge ManagementVulnerability Management (EVM)
Soft Skills
CommunicationCross-functional collaborationStakeholder managementAnalytical thinkingProblem solvingAttention to detail
Certifications
Preferred
GCTICISSPGSECCEHCISM
Keywords for Your Resume
Threat IntelligenceThreat Intelligence Platforms (TIPs)TIPsOSINTIndicators of Compromise (IOCs)IOCsadversary TTPsMITRE ATT&CKCyber Kill ChainDiamond ModelSecurity Operations Center (SOC)Vulnerability ManagementIncident ResponseThreat ReportsThreat AlertsThreat ModelingDetection LogicAdversary TrackingExecutive-ready briefingsKnowledge ManagementIndicators of Compromise
Deal Breakers
Must be eligible to work in the United States without sponsorship, No sponsorship available
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile