CrawlJobs Logo

Intern, Cyber Threat Intelligence

fsisac.com Logo

FS-ISAC

Location Icon

Location:
Singapore , Singapore

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

1800.00 USD / Month

Job Description:

The Cyber Threat Intelligence Intern will work within FS-ISAC's Global Intelligence Office (GIO), gaining practical, industry-relevant experience through direct involvement in real-world threat analysis work. Under the mentorship of experienced intelligence professionals, the intern will contribute to threat analysis efforts that support the cybersecurity and resilience of FS-ISAC's member across the region. This internship is designed to provide structured, hands-on learning in a professional intelligence environment, equipping the intern with foundational skills and knowledge applicable to a career in cyber threat intelligence.

Job Responsibility:

  • Conduct multi-source intelligence analysis on current and emerging cyber threats, applying advanced research methods and analytical techniques to produce polished, actionable intelligence reports in alignment with the GIO's intelligence strategy
  • Support the delivery of tactical and technical threat intelligence to FS-ISAC members on sector-specific threats, in accordance with established classification and handling protocols
  • Assist in the preparation and delivery of threat briefings to FS-ISAC members, communicating relevant and timely intelligence in a clear and professional manner
  • Develop working knowledge of the financial sector's assets, activities, and member landscape to provide meaningful and contextually informed intelligence support throughout the internship
  • Evaluate and recommend open-source intelligence (OSINT) tools and resources to strengthen threat analysis capabilities
  • Support the execution of FS-ISAC APAC Summit and member forums, contributing to the smooth delivery of FS-ISAC-led engagements
  • Participate in information security and cyber threat intelligence training programs

Requirements:

  • Currently pursuing a bachelor's degree in Information Systems, Cybersecurity, or a related field
  • Technical Skills — Foundational knowledge of cybersecurity technologies, techniques, and practices relevant to threat research and intelligence analysis
  • Development Skills — Practical experience with Python, development tools, and/or containerization platforms
  • Communication Skills — Effective oral and written communication skills, with the ability to produce clear, concise, and accurate intelligence reports in a timely manner, in accordance with the GIO style guide
  • Critical Thinking Skills — Ability to approach data collection and analysis in an objective, logical, and structured manner, with an awareness of analytical bias and the capacity to exercise sound judgment and initiative
  • Interpersonal Skills — A collaborative team player who works effectively within a diverse, professional environment
  • Organizational Skills — Strong time management skills, with the ability to manage multiple workstreams concurrently under tight deadlines while maintaining a high standard of output
  • Internship Duration — Minimum commitment of 6 months, with flexibility for both full-time or part-time basis

Nice to have:

  • Demonstrates a flexible and adaptable mindset, with the ability to respond effectively to evolving priorities and tasks
  • Approaches communication in an open, constructive, and professional manner
  • Has some prior exposure to cyber threat intelligence-related activities, including Open-Source Intelligence (OSINT), technical data analysis, and social media monitoring
  • Possesses a genuine interest in cyber threat intelligence analysis, malware analysis, and digital forensics, with a desire to develop deeper expertise in these areas

Additional Information:

Job Posted:
April 22, 2026

Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Intern, Cyber Threat Intelligence

Senior Cybersecurity Expert (Threat Intelligence)

At Bosch, we shape the future by inventing high-quality technologies and service...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field
  • Several years of experience in a technical cybersecurity role (e.g., CTI, SOC, Threat Hunting, Incident Response, DFIR)
  • Proven expertise in tracking and analyzing adversarial behavior, with strong knowledge of the cyber kill chain and MITRE ATT&CK framework
  • Ability to work methodically and independently while being an effective and reliable team player in a distributed team
  • Excellent communication skills with the ability to translate complex technical findings for diverse stakeholders
  • Strong scripting and tool development experience (Python, APIs, Git, Docker)
  • Fluent in English
  • German is a plus
Job Responsibility
Job Responsibility
  • Identify, analyze, and track threat actor TTPs and IOCs using threat prioritization frameworks and threat landscape monitoring
  • Investigate complex threat data to provide situational awareness, quantify trends, support ongoing investigations, and strengthen detection and response capabilities
  • Conduct in-depth technical analysis (searching, pivoting, enrichment) to support Threat Hunting and identify potential intrusions in Bosch networks and systems
  • Collaborate closely with cross-functional teams including Incident Response and Detection Engineering to integrate intelligence into detection and response workflows
  • Produce and deliver high-quality intelligence reports, briefings, and presentations tailored to technical, business, and executive audiences
  • Respond to Requests for Information (RFIs) and brief stakeholders on emerging campaigns and significant incidents
  • Develop and improve internal tools for threat analysis and monitoring (using Python, REST APIs, Git, Docker)
What we offer
What we offer
  • Competitive salary + annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits (incl. MultiSport, shopping vouchers, cinema tickets, etc.)
  • Prepaid Lunch Card
  • Number of benefits for families (for instance summer camps for kids)
  • Non-working day on the 31st of December
  • Fulltime
Read More
Arrow Right

Senior Threat Intelligence Analyst

To deliver timely, actionable threat intelligence that enables the organization ...
Location
Location
Finland , Espoo
Salary
Salary:
5600.00 - 6500.00 EUR / Month
iceye.com Logo
ICEYE
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience (5+ years) in information security, threat intelligence, national CERT/CSIRT, intelligence, or law enforcement environments
  • Extensive hands-on experience (minimum 4 years) using threat intelligence platforms (e.g. MISP) and analysis frameworks such as MITRE ATT&CK in a customer-facing or operational role
  • Strong capability in analyzing infrastructure-related threats and conducting open-source, deep web, and dark web research
  • Demonstrated expertise in utilizing STIX/TAXII feeds and automated intelligence sharing solutions
  • Solid understanding of the Finnish Cyber Security Act (NIS2), GDPR, and applicable local regulations
  • Industry-recognized certifications such as GIAC Cyber Threat Intelligence (GCTI) or equivalent
  • Excellent English communication skills, with the ability to translate complex threat intelligence into actionable insights for diverse audiences
Job Responsibility
Job Responsibility
  • Integrating actionable threat intelligence into SOC, incident response, and vulnerability management workflows to improve detection and response effectiveness
  • Analyzing malicious infrastructure, malware, and adversary artifacts to extract high-fidelity IOCs and map TTPs using frameworks such as MITRE ATT&CK
  • Enabling threat detection, attribution, and information sharing through the effective use of threat intelligence platforms, STIX/TAXII feeds, and automated intelligence sharing mechanisms
  • Producing and disseminating clear, timely operational and tactical intelligence products, including threat briefings, reports, and summaries tailored to technical teams and senior leadership
  • Providing expert intelligence support during major security incidents by correlating external threat data with internal telemetry
  • Enhancing threat hunting activities by supplying contextual intelligence that identifies emerging threats and suspicious behaviors within the environment
  • Delivering actionable cyber resilience recommendations based on threat intelligence and OSINT analysis, aligned with regulatory and legal requirements
What we offer
What we offer
  • Occupational healthcare, occupational, and accident insurance
  • A yearly benefit budget to spend as you wish (i.e. on sport, transport, bike benefit, wellness, lunch, etc.)
  • Phone subscription with iPhone of choice
  • Relocation support (i.e. flight tickets, accommodation, relocation agency support)
  • Time for self-development, research, training, conferences, or certification schemes
  • Inspiring and collaborating offices and silent workspaces enable you to focus
  • Fulltime
Read More
Arrow Right

Cyber Intelligence Operations Analyst

Amentum has an opportunity for a highly qualified Cyber Intelligence Operations ...
Location
Location
United States , Wahiawa
Salary
Salary:
165000.00 - 185000.00 USD / Year
amentum.com Logo
Amentum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in computer science, Information Security, Cybersecurity, Intelligence/International Studies, or related field
  • Minimum of 4 years of experience in intelligence analysis with a focus on cyber threats or operations
  • Proficiency in intelligence analysis tools and techniques, such as data visualization, link analysis, and threat modeling
  • Familiarity with Intelligence inputs to MDMP, JPP, and the Joint Targeting Cycle
  • Active Top-Secret Clearance with SCI eligibility and current CI Polygraph
  • US Citizenship is required to obtain a Top-Secret Clearance
Job Responsibility
Job Responsibility
  • Conduct in-depth analysis of cyber threat intelligence, including emerging malware, vulnerabilities, and attack vectors
  • Collect, evaluate, and fuse intelligence from diverse sources, including open-source intelligence (OSINT), signals intelligence (SIGINT), human intelligence (HUMINT), and technical intelligence (TECHINT). Identify correlations and patterns to enhance situational awareness and predictive analysis
  • Assess the potential impact of cyber threats on network infrastructure and operations. Collaborate with cyber defense teams to develop and implement mitigation strategies and countermeasures
  • Provide intelligence support during cyber incident response activities, including analysis of indicators of compromise (IOCs), attribution of cyber-attacks, and identification of adversary tactics, techniques, and procedures (TTPs)
  • Prepare and deliver clear and concise intelligence products, including reports, briefings, and presentations, for a diverse audience, including senior leadership, operational stakeholders, and technical teams
  • Foster collaboration and information sharing with internal and external stakeholders, including other intelligence agencies, law enforcement, industry partners, and allied nations, to enhance cyber threat awareness and response capabilities
  • Stay abreast of emerging cyber threats, technologies, and methodologies through continuous research and professional development. Contribute to the development of new analytical techniques, tools, and processes to improve intelligence analysis and cyber defense capabilities
  • Conduct target system analysis to support entity of interest for offensive cyberspace operations, coordinate for intelligence production and analysis to support advance technical development for offensive operations
  • Execute collection management drawing subordinate unit intelligence requirements and overseeing their progress through the various means of collection to resolve intelligence gaps
  • Develop Targets through Advanced Target development to achieve vetted and validated COCOM level targets for mission package execution
What we offer
What we offer
  • Health, dental, and vision insurance
  • Paid time off and holidays
  • Retirement benefits (including 401(k) matching)
  • Educational reimbursement
  • Parental leave
  • Employee stock purchase plan
  • Tax-saving options
  • Disability and life insurance
  • Pet insurance
  • Fulltime
Read More
Arrow Right

Intelligence Intermediate Analyst

Are you looking for a career move that will place you in a global financial orga...
Location
Location
Hungary , Budapest
Salary
Salary:
9178060.00 - 14294740.00 HUF / Month
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of relevant experience in cyber threat intelligence, security analysis, or a related field
  • Bachelor’s degree (or equivalent experience) required and advanced degrees are welcome- preferably in a STEM major, computer science, or cyber technology
  • Strong analytical and investigative skills with clear, concise communication abilities in English
  • Working knowledge in one or more of the following areas: Advanced Persistent Threat, Third Party Risks/Threats, Cybercrime, Extremist Groups and Cyber Terrorists, Hacktivism, Distributed Denial of Service attacks, Fraud, Malware, Mobile Threats
Job Responsibility
Job Responsibility
  • Analyze cyber threat alerts and intelligence reports to identify and assess risks to Citi
  • Monitor cyber threat actors and trends (e.g. APTs, fraud, hacktivism, malware)
  • Investigate and report on security incidents, breaches, and data threats
  • Create and use custom tools to support threat analysis and intelligence collection
  • Collaborate with internal teams and external partners, including law enforcement and industry peers
  • Prepare high-quality briefings and written intelligence products for leadership
  • Research new threat sources, technologies, and analytical methods
  • Support automation and innovation in intelligence workflows and tooling
What we offer
What we offer
  • Cafeteria Program
  • Home Office Allowance (for colleagues working in hybrid work models)
  • Paid Parental Leave Program (maternity and paternity leave)
  • Private Medical Care Program and onsite medical rooms at our offices
  • Pension Plan Contribution to voluntary pension fund
  • Group Life Insurance
  • Employee Assistance Program
  • Access to a wide variety of learning and development programs, online course libraries and upskilling platforms, such as Udemy and Degreed
  • Flexible work arrangements to support you in managing work - life balance
  • Career progression opportunities across geographies and business lines
  • Fulltime
Read More
Arrow Right

Cyber Security Analyst

Blockchain.com is connecting the world to the future of finance. As the most tru...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
blockchain.com Logo
Blockchain
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience with scripting and programming languages (e.g., Python, Bash)
  • Familiarity with security monitoring and analysis tools
  • Understanding of endpoint protection concepts and tools
  • Experience with incident response processes and escalation
  • Ability to identify and investigate suspicious behaviour
  • Strong analytical and problem-solving skills
  • Excellent communication and collaboration skills
  • A passion for learning and staying up-to-date with the latest security trends
  • A commitment to integrity, transparency, and excellence in all aspects of work
Job Responsibility
Job Responsibility
  • Manage endpoint protection software, including reviewing, testing, and deploying updates to employee laptops
  • Assist with threat intelligence and analysis of attacks targeting employees
  • Play a key role in protecting Blockchain.com from phishing and impersonation campaigns
  • Monitor and respond to both internal and external security threats, escalating as needed
  • Manage security incidents, escalating as needed
  • Maintain and update security documentation and procedures
  • Participate in security training and awareness programs for employees
  • Be the first point of contact for security related questions across the company
What we offer
What we offer
  • Competitive salary based on experience with meaningful equity in a leading industry company
  • Apple equipment for your work setup
  • Comprehensive benefits package, including private medical insurance (BUPA), dental, pension, life insurance, short- and long-term disability coverage
  • The opportunity to contribute to a fast-growing, global technology company at the forefront of the industry
  • Work from Anywhere Policy
  • Fulltime
Read More
Arrow Right

Director, Rapid Response

We are seeking a Director of Rapid Response for our Unit 42 Threat Intelligence ...
Location
Location
United States , Santa Clara
Salary
Salary:
243800.00 - 334575.00 USD / Year
paloaltonetworks.com Logo
Palo Alto Networks
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Highly organized with the ability to manage complex multi-tasking, prioritize effectively, and triage competing demands in a fast-paced environment
  • Ability to advance objectives across matrixed teams and influence without direct reporting authority
  • Strong public speaking and presentation skills, with the ability to effectively communicate complex threat intelligence information to diverse audiences, including executives, conferences, and internal stakeholders
  • Demonstrated ability to coordinate with cross-organizational threat analysts, facilitating collaboration, and aligning efforts to achieve common goals
  • Proven experience leading threat intelligence projects, integrating intelligence systems, and implementing new processes for multiple stakeholders
  • Demonstrated experience speaking at conferences and with customers on research performed
  • Proven experience throughout the cyber threat intelligence lifecycle, from data collection to production of intelligence outputs, such as blogs and whitepapers
  • Experience writing and editing threat intelligence reporting.
Job Responsibility
Job Responsibility
  • Collaborate with threat analysts, detection engineers, and security consultants from various teams and departments within the organization
  • Coordinate and balance priorities across diverse teams, including Communications, Legal, Policy, Marketing, to align external and internal messaging around global cyber events
  • Triage and prioritize threat intelligence research requests during Rapid Response engagements
  • Work closely with the external engagement team to manage the flow of Rapid Response content, including blogs, social media content, and updates on major cyber events
  • Contribute to thought leadership initiatives by sharing insights and expertise on Unit 42 Threat Vector podcasts, at security conferences, and through internal and external executive briefings
  • Establish and execute internal projects to mature and scale our Rapid Response capabilities
  • Harness the full weight of the company's unique data holdings, including security product telemetry, front line Incident Response (IR) and Managed Detection and Response (MDR) data, and Intel Holdings.
  • Fulltime
Read More
Arrow Right

Senior Cyber Security Consultant

Join Our Expert Team. We are seeking a skilled Senior Cyber Security Consultant ...
Location
Location
Austria , Vienna
Salary
Salary:
Not provided
alpenite.com Logo
Arsenalia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Master’s degree in Computer Science, Cybersecurity, Engineering or similar fields
  • 6-8 years of experience in senior cybersecurity roles, with at least 3 years in technical leadership positions
  • Solid expertise in enterprise security architectures, zero-trust frameworks, and multi-cloud security (AWS, Azure, GCP)
  • Proven track record in managing enterprise security programs and coordinating incident response teams
  • Strong skills in analyzing advanced threats and designing defense-in-depth strategies
  • Excellent strategic coordination and executive-level communication
  • Fluent in English (C1/C2) with experience in international environments
  • Willingness to travel frequently and lead projects across multiple geographies
  • Strong results orientation, strategic mindset, and continuous innovation drive
Job Responsibility
Job Responsibility
  • Design and implement security solutions for multi-cloud and hybrid environments
  • Lead strategic threat analysis and large-scale vulnerability assessments to shape long-term security planning
  • Manage complex incidents and breaches, coordinating cross-functional teams and engaging with C-level stakeholders
  • Embed security-by-design into digital transformation programs and enterprise architectures
  • Define and apply governance frameworks aligned with international standards (ISO 27001, NIST, SOC2)
  • Build proactive threat intelligence and hunting strategies to stay ahead of emerging risks
  • Mentor junior and mid-level security professionals, fostering a strong security-first mindset
  • Represent Arsenalia in high-level technical and business contexts, acting as a trusted advisor to enterprise clients
What we offer
What we offer
  • Welfare Package: A comprehensive corporate welfare platform, offering a wide range of benefits and healthcare support
  • Worklife Kit: A complete welcome package with all essentials for day-to-day productivity, complemented by comprehensive benefits
  • digital meal vouchers and flexible reimbursement options
  • Empowering People: Engagement initiatives, team building, and mentoring programs
  • Open Space, Open Mind: Modern open-space offices and collaborative areas
  • Career Path: internal Changemaker Path methodology to grow key relational, communication, and leadership skills
  • Learning & Development: Continuous improvement programs, certification opportunities, and incentives
Read More
Arrow Right

Cyber Intelligence Analyst

Rapid7 is looking for a Cyber Intelligence Analyst to join our Cyber Threat Inte...
Location
Location
Czechia , Prague
Salary
Salary:
Not provided
rapid7.com Logo
Rapid7
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 1–2 years of experience in cyber intelligence, or a related technical role
  • Analytical Skills: Ability to analyze threat data, identify patterns, and draw evidence-based conclusions
  • Research Capability: Ability to carry out structured online research using open-source intelligence methods
  • Foundational understanding of cyber threats, attack vectors, and common cybercrime techniques
  • Experience investigating phishing, data leaks, malware, or other external threats
  • Familiarity with extracting and analyzing threat data such as IPs, domains, URLs, and malware artifacts
  • Accountable for managing investigations within defined workflows and ticketing systems, owning cases end-to-end and delivering timely, accurate, and high-quality outcomes
  • Works collaboratively with cross-functional stakeholders to collect relevant context, align on findings, and support informed decision-making
  • Strong written English with the ability to communicate clearly and concisely, able to summarize complex findings clearly for customer-facing and internal audiences
  • Core Value Embodiment: Embody our core values to foster a culture of excellence that drives meaningful impact and collective success
Job Responsibility
Job Responsibility
  • Respond to customer RFIs within defined scope and SLAs, using approved intelligence tools and research techniques
  • Investigate cyber threats such as phishing, data leakage, ransomware, DDoS, and impersonation activities
  • Collect, analyze, and document intelligence from OSINT, platform data, and dark web sources
  • Identify threat indicators, attacker behavior, and relevant context to assess potential customer impact
  • Produce clear, concise, and customer-ready intelligence outputs, including reports and investigation summaries
  • Escalate complex or out-of-scope findings in accordance with established workflows
  • Collaborate with internal teams including MDR, SOC, Remediation, and Customer Success as needed
Read More
Arrow Right