This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
To deliver timely, actionable threat intelligence that enables the organization to proactively detect, understand, and mitigate cyber threats, strengthening overall security resilience. As a Senior Threat Intelligence Analyst, you will serve as a hands-on intelligence practitioner, collecting and analyzing data from multiple sources to identify adversary tactics, techniques, and procedures using frameworks such as MITRE ATT&CK. You will produce high-quality tactical intelligence, collaborate closely with SOC and incident response teams, and translate complex threat activity into clear, actionable insights. As a key contributor to the global security function, you will balance deep technical analysis with strategic impact—improving threat intelligence processes, enhancing operational efficiency, and delivering concise briefings to senior leadership to inform risk-based security decisions.
Job Responsibility:
Integrating actionable threat intelligence into SOC, incident response, and vulnerability management workflows to improve detection and response effectiveness
Analyzing malicious infrastructure, malware, and adversary artifacts to extract high-fidelity IOCs and map TTPs using frameworks such as MITRE ATT&CK
Enabling threat detection, attribution, and information sharing through the effective use of threat intelligence platforms, STIX/TAXII feeds, and automated intelligence sharing mechanisms
Producing and disseminating clear, timely operational and tactical intelligence products, including threat briefings, reports, and summaries tailored to technical teams and senior leadership
Providing expert intelligence support during major security incidents by correlating external threat data with internal telemetry
Enhancing threat hunting activities by supplying contextual intelligence that identifies emerging threats and suspicious behaviors within the environment
Delivering actionable cyber resilience recommendations based on threat intelligence and OSINT analysis, aligned with regulatory and legal requirements
Requirements:
Proven experience (5+ years) in information security, threat intelligence, national CERT/CSIRT, intelligence, or law enforcement environments
Extensive hands-on experience (minimum 4 years) using threat intelligence platforms (e.g. MISP) and analysis frameworks such as MITRE ATT&CK in a customer-facing or operational role
Strong capability in analyzing infrastructure-related threats and conducting open-source, deep web, and dark web research
Demonstrated expertise in utilizing STIX/TAXII feeds and automated intelligence sharing solutions
Solid understanding of the Finnish Cyber Security Act (NIS2), GDPR, and applicable local regulations
Industry-recognized certifications such as GIAC Cyber Threat Intelligence (GCTI) or equivalent
Excellent English communication skills, with the ability to translate complex threat intelligence into actionable insights for diverse audiences
What we offer:
Occupational healthcare, occupational, and accident insurance
A yearly benefit budget to spend as you wish (i.e. on sport, transport, bike benefit, wellness, lunch, etc.)
Phone subscription with iPhone of choice
Relocation support (i.e. flight tickets, accommodation, relocation agency support)
Time for self-development, research, training, conferences, or certification schemes
Inspiring and collaborating offices and silent workspaces enable you to focus