Threat Intelligence Analyst
Job Description
Staying ahead of sophisticated cyber adversaries requires deep insight into their motives and methods. As a Threat Intelligence Analyst, you will empower AI to become a formidable force in understanding the global threat landscape, tracking APTs, and predicting future attacks.
Key Responsibilities
Evaluate AI outputs related to the analysis of cyber threat intelligence (CTI) reports, including TTPs, IOCs, and threat actor profiles.
Assess the accuracy and relevance of AI-generated insights on Advanced Persistent Threats (APTs), state-sponsored groups, and cybercriminal organizations.
Provide detailed feedback on AI's ability to correlate threat data from various sources (OSINT, commercial feeds, dark web).
Develop benchmark scenarios for AI to analyze, covering topics like malware campaigns, zero-day exploits, and geopolitical cyber warfare.
Validate AI's explanations of threat intelligence frameworks (e.g., MITRE ATT&CK, Kill Chain) and their application in defense.
Refine AI's ability to forecast emerging threats and recommend proactive defensive measures based on intelligence.
Ideal Qualifications
Minimum 5 years of experience in cyber threat intelligence, security research, or intelligence analysis.
Certifications such as GCTI, CySA+, or CISSP are highly valued.
Proficiency with threat intelligence platforms (TIPs) and open-source intelligence (OSINT) tools.
Strong understanding of threat actor methodologies, malware families, and vulnerability exploitation.
Experience with data analysis, correlation, and visualization techniques for large datasets.
Ability to read and interpret technical reports, including reverse engineering analyses and forensic findings.
Project Timeline
Start Date: Within 1 week
Duration: 6 months (renewable)
• Commitment: Part-time, 20-30 hours/week
Arm AI with unparalleled threat insight – join our expert team!