✦ Luna Orbit — System Administration

Threat Intelligence Senior Associate

at DTCC

📍 Tampa, FL, United States Hybrid Posted April 14, 2026
Type Not Specified
Experience senior
Exp. Years Not specified
Education Not specified
Category System Administration

DTCC is hiring a Threat Intelligence Senior Associate to research emerging threats and produce Indicators of Compromise (IOC) to support security monitoring and operational readiness. The role also contributes to IT Risk and Information Security programs through risk and control assessments and serves as an interface for regulatory and client reviews.

  • Conduct research using open source, subscription intelligence feeds, and security-related services to monitor threats and generate Indicators of Compromise (IOC)
  • Collect and examine forensic artifacts including source code, malware, and trojans
  • Produce written analytical reports and quantitative reports
  • Support IT Risk and Information Security programs via risk and control assessments and threat monitoring
  • Serve as the main interface for Regulatory and Client reviews for IT Risk and Information Security

The role centers on cyber threat intelligence: using open source and subscription intelligence feeds to monitor and assess threats, generating Indicators of Compromise (IOC), and examining forensic artifacts including source code, malware, and trojans. The candidate will prepare analytical and quantitative reports and support threat monitoring and incident-related activities within IT Risk and Information Security governance.

The ideal candidate is a senior threat intelligence professional experienced in cyber threat intelligence research using open source and subscription intelligence feeds, producing Indicators of Compromise (IOC), and analyzing forensic artifacts such as malware and trojans. They can write strong analytical reports, support IT Risk and Information Security programs as a second line of defense, and interface effectively with regulatory and client stakeholders in a hybrid environment.

Conduct research using open sourcesubscription intelligence feedssecurity-related servicesgenerate Indicators of Compromise (IOC)collect and examine forensic artifactsproduce written analytical reportssupport IT Risk and Information Security programs through threat intelligenceinterface for Regulatory and Client reviews
sharing and collaboration with governmentsectorand cyber security industry partnersunderstanding when threats are being targeted against the firmsupporting both physical and cyber security operations
Indicators of Compromise (IOC) generationsecurity monitoring tools
Cyber Threat Intelligenceopen source researchsubscription intelligence feedssecurity-related servicesIndicators of Compromise (IOC)forensic artifactssource codemalwaretrojanswritten analytical reportsquantitative reportsIT RiskInformation Securityrisk and control assessmentssecond line of defensethreat monitoringincident supportregulatory and client reviewscollaboration with government and sector partners
Cyber Threat Intelligenceopen source researchsubscription intelligence feedssecurity-related servicesIndicators of Compromise (IOC)security monitoring toolsforensic artifactssource codemalwaretrojanswritten analytical reportsquantitative reportsIT riskInformation Securityrisk and control assessmentssecurity policiescontrol standardsincident response supportthreat monitoringthreat targeting analysisregulatory and client reviewssharing and collaboration with government partnerssector partnerscyber security industry partners
reporting to leadershipstakeholder interfacecollaborationcommunicationinterface with Regulatory and Client reviewsstrategic direction settingsecond line of defense mindset
Industry Fintech
Job Function Research and operationalize cyber threat intelligence to inform IT Risk and Information Security decisions and reporting.
Role Subtype Security Analyst
Tech Domains Cybersecurity
Threat Intelligence Senior AssociateCyber Threat IntelligenceIT RiskInformation Securityopen sourcesubscription intelligence feedsIndicators of Compromise (IOC)forensic artifactssource codemalwaretrojanswritten analytical reportsquantitative reportsrisk and control assessmentssecond line of defenseincidentthreat monitoringregulatoryclient reviewsgovernment partnerssector partnerscyber security industry partnersphysical and cyber security operationsstrategic directionregulatory and client reviews

Must be able to conduct threat research using open source and subscription intelligence feeds, Must have experience producing Indicators of Compromise (IOC) and analyzing forensic artifacts (malware, trojans)

Apply for this Position →

Get matched to jobs like this

Luna finds roles that fit your skills and career goals — no endless scrolling required.

Create a Free Profile