CrawlJobs Logo

Security Threat Intelligence and Hunting Analyst

nttdata.com Logo

NTT DATA

Location Icon

Location:
Spain , Barcelona

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

As a Security Threat Intelligence and Hunting Analyst, you will analyze and detect cyber threats, enabling informed cybersecurity decisions. Your responsibilities include investigating threats, advising on security measures, and monitoring alerts to identify potential risks. A bachelor’s degree in a related field and relevant certifications are required. Join us to make a significant impact in cybersecurity!

Job Responsibility:

  • Reads reports, makes risk assessments, works to detect the source of attacks and tests current defenses against threats
  • Advises on analysis enabling organization to make decisions on how to improve security measures and respond to attacks
  • Monitors security alerts and maintains awareness of new threats and vulnerabilities in order to identify potential risks
  • Analyses data from various sources, including network traffic, email logs, malware files, web server logs, DNS records, etc. to identify cybersecurity risks
  • Develops and maintains threat intelligence databases containing information about cybercrime tactics, techniques, and procedures (TTPs) used by hackers or other actors targeting the organization’s assets
  • Participates in Incident Response activities as necessary to identify and contain new threats
  • Conducts investigations into potential threats by collecting data from multiple sources and analyzing it to identify patterns or other significant pieces of information that indicate a specific threat may be occurring or has occurred previously
  • Communicates with senior leaders and also executives and other stakeholders on security matters to raise awareness of potential risks and recommend solutions
  • Conducts regular audits of security measures to identify vulnerabilities that could be exploited by unauthorized users
  • Reviews security policies to ensure compliance with industry regulations and best practices
  • Creates reports about potential threats for internal use by management or external use by customers or other stakeholders
  • Performs any other related task as required

Requirements:

  • Bachelor’s degree or equivalent in computer science, information technology or security or related field
  • Relevant security certification(s) such as GIAC Certified Forensic Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE), and GIAC Certified Forensic Analyst (GCFACTIA, CompTIA Cybersecurity Analyst (CySA+), GCTI, FOR508 preferred
  • Seasoned demonstrated experience in a similar role
  • Seasoned demonstrated experience gained within a global technology organization
  • Ability to apply critical thinking skills to a situation and make a decision based on the information to hand
  • Good understanding of computer systems, software and technology in general
  • Excellent written and verbal communication
  • Ability to research topics and find information relevant to their work
  • Ability to interpret large amounts of data and identify important details to identify potential threats and vulnerabilities
  • Seasoned proficiency in threat hunting methodologies, including familiarity with tools and techniques for proactive detection of threats
  • Seasoned knowledge of data analysis, log analysis, and behavioral analytics to identify anomalous activities and indicators of compromise (IOCs)
  • Ability to contribute to investigations, perform post-incident analysis, and identify threat actor tactics, techniques, and procedures (TTPs)
  • Seasoned proficiency in threat intelligence analysis, including the ability to collect, correlate, and interpret large volumes of data from multiple sources
  • Strong analytical and critical thinking skills are required to identify patterns, trends, and potential risks
  • Seasoned knowledge of cybersecurity principles, attack vectors, and defensive strategies is essential
  • Seasoned familiarity with various security technologies, threat intelligence platforms, and data analysis tools is also necessary

Additional Information:

Job Posted:
January 26, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Security Threat Intelligence and Hunting Analyst

Security Intelligence Analyst

Atlassian is hiring a Security Intelligence Analyst to join its team. The role i...
Location
Location
United States , Austin
Salary
Salary:
128300.00 - 172500.00 USD / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Security, or a related field
  • 3 years relevant experience working in security using at least one scripting language (i.e. Python, Pearl, Ruby, Bash), writing code to complete security tasks
  • Must pass technical interview.
Job Responsibility
Job Responsibility
  • Build and run new monitoring/analytics systems
  • Watch over corporate environment and Atlassian cloud services, hunting for signs of compromise and implementing high-fidelity alerts
  • Build a new system, develop automation, and solve security problems
  • Respond to incidents, writing code in Python
  • Research attacker tools and tactics
  • Conduct in-depth research on attacker tools and tactics to provide valuable insights to enhance overall security measures
  • Safeguard digital infrastructure by responding to major incidents
  • Ensure confidentiality, integrity, and availability of sensitive information
  • Configure and monitor security controls for JIRA, Confluence, and Bitbucket
  • Analyze security alerts, network traffic, and logs to understand and respond to incidents
What we offer
What we offer
  • Health and wellbeing resources
  • Paid volunteer days
  • Other perks as outlined on go.atlassian.com/perksandbenefits.
  • Fulltime
Read More
Arrow Right

Threat Intelligence Analyst

As the first US member of the Threat Intelligence team, you’ll be joining a glob...
Location
Location
United States , San Francisco
Salary
Salary:
128300.00 - 206000.00 USD / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2+ years experience in Threat Intelligence roles
  • 3+ years experience in Cyber Security roles
  • Experience generating threat intelligence using behavioural-based threat models, including ATT&CK, Cyber Kill Chain, Diamond Model, etc.
  • Experience using common Threat intelligence tools and platforms like MISP, OpenCTI, etc.
  • Experience performing hunting for Cyber Threat Actors
  • Experience building automation of common security operations tasks
  • You have deep knowledge of cyber threats, attacker TTPs and attack methodologies
  • You have strong communication skills and problem-solving skills, with the ability to analyse complex data.
Job Responsibility
Job Responsibility
  • Conduct proactive research to anticipate and mitigate potential cyber threats and vulnerabilities that target Atlassian and its customers
  • Produce actionable intelligence to the security teams by following the Threat intelligence lifecycle framework
  • Collaborate with the Detections & Response team to provide additional insights during security investigations
  • Develop and maintain threat profiles for key adversaries, including their tactics, techniques, and procedures (TTPs), motivations, and capabilities
  • Participate in threat intelligence sharing initiatives with external partners and industry peers
  • Contribute to the wider threat intelligence community, establishing Atlassian as a key contributor in the space
  • Integrate Threat Intelligence into Atlassian systems and practices
  • Investigate malicious code to extract Tactics, Techniques and Procedures (TTP)
  • Develop and deliver threat briefings to both technical and non-technical audiences.
What we offer
What we offer
  • Health and wellbeing resources
  • Paid volunteer days
  • Equity
  • Bonuses
  • Commissions
  • Flexible work options (onsite, remote, hybrid)
  • Fulltime
Read More
Arrow Right

Cyber Security Soc Analyst

The SOC Analyst (L1/L2) and Lead are responsible for proactive monitoring, detec...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong knowledge of SIEM platforms and alert investigation
  • Advanced incident response, malware analysis, and RCA expertise
  • Deep knowledge of endpoint and network security tools
  • Threat hunting and forensic investigation capabilities
  • Familiarity with vulnerability management and DLP/email security
  • Experience with threat intelligence platforms and TTP mapping
  • Strong analytical, communication, and documentation skills
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
Job Responsibility
Job Responsibility
  • Proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions
  • Guide and architect SOC workflows and systems to ensure robust organizational security
  • Threat hunting and forensic investigation
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Leadership and team management
What we offer
What we offer
  • Inclusive and respectful work environment
  • Positions open to people with disabilities
  • Fulltime
Read More
Arrow Right

Cyber Security-Fraud Analyst

The L2 Support Fraud Detection Senior Analyst is a pivotal team member responsib...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Tools: Octoflow, Mosaic
  • conduct investigations and reporting using Octoflow and Mosaic platforms
  • provide recommendations based on analytics derived from these tools
  • support secure integration of APIs and web services within fraud detection platforms
  • liaise with developers to validate and enhance security features in applications
  • analyse and correlate logs using SIEM solutions to identify and remediate suspicious activity
  • respond to real-time alerts and participate in threat hunting operations
  • integrate threat intelligence feeds into operational systems
  • regularly update detection mechanisms in response to emerging risks
  • lead and document the resolution of escalated fraud incidents
Job Responsibility
Job Responsibility
  • Conduct investigations and reporting using Octoflow and Mosaic platforms
  • provide recommendations based on analytics derived from these tools
  • support secure integration of APIs and web services within fraud detection platforms
  • liaise with developers to validate and enhance security features in applications
  • analyse and correlate logs using SIEM solutions to identify and remediate suspicious activity
  • respond to real-time alerts and participate in threat hunting operations
  • integrate threat intelligence feeds into operational systems
  • regularly update detection mechanisms in response to emerging risks
  • lead and document the resolution of escalated fraud incidents
  • collaborate with cross-functional teams for swift containment, investigation, and recovery
What we offer
What we offer
  • Inclusive and respectful work environment
  • positions open to people with disabilities.
  • Fulltime
Read More
Arrow Right

Senior Cybersecurity Analyst, Threat Hunter

Our cybersecurity and information security teams at IDEXX contribute to a more r...
Location
Location
United States , Westbrook, Maine
Salary
Salary:
120000.00 - 140000.00 USD / Year
idexx.com Logo
IDEXX
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6–10 years of experience in cybersecurity roles
  • Minimum of 3 years dedicated specifically to threat hunting or advanced incident response
  • Bachelor’s degree in computer science, Cybersecurity, Information Technology, or a related field
  • Preferred certifications GCIH (GIAC Certified Incident Handler) and CompTIA CySA+ (Cybersecurity Analyst+) certification
  • Proven, hands-on experience using platform for EDR (Endpoint Detection and Response) and threat hunting
  • Expert-level knowledge of PowerShell Scripting, Python and EDR and SIEM query language is preferred
  • Deep understanding of incident response lifecycles, methodologies, and forensic techniques
  • Strong knowledge of networking protocols, operating systems (Windows, Linux, macOS), and common attack vectors
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation of hunting tasks is a plus
  • Exceptional analytical and problem-solving skills with keen attention to detail
Job Responsibility
Job Responsibility
  • Proactively hunt for indicators of compromise (IOCs) and advanced persistent threats (APTs) across the network, endpoints, and cloud environments using threat intelligence and a hypothesis-driven methodology
  • Conduct in-depth analysis of security events, network traffic, and endpoint data to identify malicious activity and potential breaches
  • Utilize the SIEM and EDR platform extensively, applying expert knowledge of the scripting, SIEM and EDR query language to perform complex searches and data analysis
  • Lead and participate in incident response activities, including containment, eradication, and recovery efforts, serving as a primary escalation point for critical security incidents
  • Develop and refine threat hunting playbooks, procedures, and detection rules to improve the security team’s efficiency and effectiveness
  • Collaborate with the security engineering and security operations center (SOC) teams to integrate new threat intelligence and enhance existing security tools and controls
  • Mentor junior analysts and contribute to the ongoing improvement of the organization's overall security posture
What we offer
What we offer
  • Opportunity for annual cash bonus
  • Health / Dental / Vision Benefits Day-One
  • 5% matching 401k
  • Additional benefits including but not limited to financial support, pet insurance, mental health resources, volunteer paid days off, employee stock program, foundation donation matching
  • Fulltime
Read More
Arrow Right

Threat Intelligence Research Engineer

We’re looking for a Threat Intelligence Research Engineer who can bridge two wor...
Location
Location
United States , Orlando
Salary
Salary:
Not provided
threatlocker.com Logo
ThreatLocker
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years in cybersecurity research, threat intelligence, security engineering, SOC analysis, or malware analysis
  • Strong knowledge of attacker TTPs, MITRE ATT&CK, malware behavior, incident response, and threat hunting workflows
  • Hands-on familiarity with tools such as SIEMs, sandboxes, EDR platforms, packet analyzers, and OSINT frameworks
  • Ability to read logs, investigate incidents, and interpret technical artifacts
  • Proven experience writing technical reports, threat advisories, security research, or cybersecurity analysis
  • Ability to translate complex material into clear, concise content without losing technical accuracy
  • Strong editorial judgment and an understanding of narrative clarity and structure
  • Deep curiosity and a research-driven mindset
  • Commitment to accuracy, integrity, and evidence-backed analysis
  • Ability to juggle multiple research topics while meeting publishing deadlines
Job Responsibility
Job Responsibility
  • Monitor, analyze, and report on emerging threats, indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs), and global threat trends
  • Investigate vulnerabilities, misconfigurations, malware behavior, ransomware campaigns, and exploit chains
  • Conduct independent research on threat actors, intrusion patterns, and security gaps relevant to our customer base
  • Collaborate with internal engineering, SOC, and threat teams to access proprietary intelligence and validate findings
  • Produce clear, defensible, and high-accuracy analysis based on data and technical evidence
  • Transform threat research into high-quality reports, whitepapers, blogs, briefs, advisories, and thought-leadership content
  • Write in a way that resonates with cybersecurity professionals, executives, and IT leaders
  • Contribute to articles under the names of internal subject matter experts (SMEs) to elevate their voices and strengthen company authority
  • Develop clear visuals, diagrams, and technical explanations to support complex research
  • Ensure all content is technically rigorous, original, and aligned with our Zero Trust security philosophy
Read More
Arrow Right

Senior Threat Intelligence Analyst

To deliver timely, actionable threat intelligence that enables the organization ...
Location
Location
Finland , Espoo
Salary
Salary:
5600.00 - 6500.00 EUR / Month
iceye.com Logo
ICEYE
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience (5+ years) in information security, threat intelligence, national CERT/CSIRT, intelligence, or law enforcement environments
  • Extensive hands-on experience (minimum 4 years) using threat intelligence platforms (e.g. MISP) and analysis frameworks such as MITRE ATT&CK in a customer-facing or operational role
  • Strong capability in analyzing infrastructure-related threats and conducting open-source, deep web, and dark web research
  • Demonstrated expertise in utilizing STIX/TAXII feeds and automated intelligence sharing solutions
  • Solid understanding of the Finnish Cyber Security Act (NIS2), GDPR, and applicable local regulations
  • Industry-recognized certifications such as GIAC Cyber Threat Intelligence (GCTI) or equivalent
  • Excellent English communication skills, with the ability to translate complex threat intelligence into actionable insights for diverse audiences
Job Responsibility
Job Responsibility
  • Integrating actionable threat intelligence into SOC, incident response, and vulnerability management workflows to improve detection and response effectiveness
  • Analyzing malicious infrastructure, malware, and adversary artifacts to extract high-fidelity IOCs and map TTPs using frameworks such as MITRE ATT&CK
  • Enabling threat detection, attribution, and information sharing through the effective use of threat intelligence platforms, STIX/TAXII feeds, and automated intelligence sharing mechanisms
  • Producing and disseminating clear, timely operational and tactical intelligence products, including threat briefings, reports, and summaries tailored to technical teams and senior leadership
  • Providing expert intelligence support during major security incidents by correlating external threat data with internal telemetry
  • Enhancing threat hunting activities by supplying contextual intelligence that identifies emerging threats and suspicious behaviors within the environment
  • Delivering actionable cyber resilience recommendations based on threat intelligence and OSINT analysis, aligned with regulatory and legal requirements
What we offer
What we offer
  • Occupational healthcare, occupational, and accident insurance
  • A yearly benefit budget to spend as you wish (i.e. on sport, transport, bike benefit, wellness, lunch, etc.)
  • Phone subscription with iPhone of choice
  • Relocation support (i.e. flight tickets, accommodation, relocation agency support)
  • Time for self-development, research, training, conferences, or certification schemes
  • Inspiring and collaborating offices and silent workspaces enable you to focus
  • Fulltime
Read More
Arrow Right

SOC Analyst

We are seeking a SOC Analyst to strengthen its cybersecurity operations. This ro...
Location
Location
United States , Jersey City
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience with SIEM tools (Sentinel, AlienVault) and EDR solutions (CrowdStrike, SentinelOne)
  • Strong knowledge of cloud security (AWS, Azure) and DevSecOps tools (Jenkins, GitHub, Kubernetes)
  • Proficiency in network protocols (TCP/IP, DNS, HTTP) and IAM solutions (Okta, Azure AD)
  • Hands-on experience with vulnerability management tools (Nessus, Metasploit)
  • Understanding of compliance frameworks (GDPR, HIPAA, PCI DSS)
  • Strong analytical and problem-solving abilities
  • Excellent communication skills with cross-functional teams
  • Proactive, detail-oriented, and thrives in a fast-paced environment
  • Bachelor's degree in Cybersecurity, IT, or a related field, or equivalent experience
  • 3+ years in SOC/security operations
Job Responsibility
Job Responsibility
  • Monitoring & Incident Response – Analyze security logs, investigate alerts, contain threats, and collaborate with MTDR vendors on SIEM configuration
  • Threat Intelligence & Hunting – Leverage threat intelligence feeds, proactively hunt for security risks, and apply MITRE ATT&CK methodologies
  • Network & Endpoint Security – Secure firewalls, IDS/IPS, VPNs, and manage EDR solutions to protect enterprise assets
  • Cloud & Application Security – Conduct security assessments, enforce best practices in AWS, Azure, and Google Cloud, and automate security measures within CI/CD pipelines
  • IAM & Data Security – Monitor identity and access management (IAM) systems, detect unauthorized access, and implement encryption and DLP policies
  • Compliance & Risk Management – Support audits for GDPR, HIPAA, and NIST compliance while performing internal security checks
  • Reporting & Communication – Generate detailed reports, collaborate with IT, development, and management teams, and contribute to security awareness initiatives
What we offer
What we offer
  • medical, vision, dental, and life and disability insurance
  • eligible to enroll in our company 401(k) plan
  • Fulltime
Read More
Arrow Right