CrawlJobs Logo

Threat Analyst

nttdata.com Logo

NTT DATA

Location Icon

Location:
Romania , Sibiu

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

As a Threat Analyst at NTT DATA, you will be responsible for researching and analyzing Indicators of Compromise (IOCs) and threat actor profiles. This role requires a bachelor's degree in Cybersecurity or related fields and 1-3 years of experience in cybersecurity roles. You will utilize your skills in Python and threat intelligence platforms to deliver actionable insights and communicate emerging threats to stakeholders.

Job Responsibility:

  • Research, track, and analyze Indicators of Compromise (IOCs) and threat actor profiles using sources that include open-source (OSINT), dark web forums, government feeds, and commercial intelligence platforms
  • Conduct detailed analysis of Threat Actor Tactics, Techniques, and Procedures (TTPs) and malware
  • Deliver actionable intelligence insights to enhance detection, prevention, and response embedded within the threat lifecycle
  • Develop and deliver weekly threat briefs, annual landscape overviews, and ad-hoc risk signals for both technical and non-technical audiences
  • Produce detailed reports based on industry-specific campaigns or identified vulnerability patterns
  • Communicate emerging threats to relevant technical stakeholders, influencing rapid mitigation strategy formulation
  • Integrate threat intelligence feeds (TIPs) into platforms like SIEM or SOAR, prioritizing automation workflows where required
  • Track and assess malware campaigns, underground forums, and marketplaces to identify emerging attack vectors
  • Analyze threat data to produce predictive insights about probable trends and future adversarial strategies
  • Represent NTT DATA at external security forums and intelligence-sharing communities

Requirements:

  • Bachelor’s degree in Cybersecurity, Computer Science, International Relations, or Intelligence Studies strongly preferred
  • Minimum 1–3 years of experience in cybersecurity or IT security roles
  • Advanced scripting capabilities (Python, PowerShell preferred)
  • Strong proficiency with threat intelligence platforms like MISP, ThreatConnect, or Anomali, Security Alliance
  • Deep familiarity with MITRE ATT&CK framework, dark web monitoring techniques, and attack simulation techniques
  • Demonstrated skills in cyber threat modeling, malware reverse engineering, and API-triggered automation
  • Strong analytical and problem-solving abilities
  • Excellent written and verbal communication skills
  • Attention to detail and accuracy in technical analysis
  • Direct experience working in government, military, or intelligence organizations advantageous
  • Experience identifying and neutralizing Advanced Persistent Threats (APTs) in target environments
  • CREST Practitioner Security Analyst (CPSA), GCTI, MITRE ATT&CK CTI or related
  • Excellent command of both spoken and written English

Nice to have:

Direct experience working in government, military, or intelligence organizations advantageous

What we offer:
  • Smooth integration and a supportive mentor
  • Choose from Remote, Hybrid or Office work opportunities
  • Projects have different working hours to suit your needs
  • Sponsored certifications, trainings and top e-learning platforms
  • Private Health Insurance
  • Individual coaching sessions or joining our accredited Coaching School
  • Epic parties or themed events

Additional Information:

Job Posted:
January 26, 2026

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Threat Analyst

Cyber Threat Analyst

Altamira is searching for Foreign Cyber Threat Analyst in the Chantilly, VA area...
Location
Location
United States , Chantilly
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelors Degree in Cybersecurity or related field
  • Must be a U.S. Citizen
  • Active TS/SCI Clearance w/ CI Poly
  • Preferred 10+ years of Cyber Threat analysis fusion from multiple data sources
Job Responsibility
Job Responsibility
  • Provide cyber threat intelligence assessments, data, briefings, and information to support the National Space Intelligence Center (NSIC)
  • Analyze potential cyber threats to space-based systems and services
  • Analysis of the risks and trends associated with threats to space-based systems and services
  • Prepare and present briefings on cyber threat intelligence topics to various organizations and committees
  • Recommend mitigations to the cyber threats identified
  • Coordinate with Government representatives from multiple agencies and committees
  • Provide comprehensive analysis of current events
Read More
Arrow Right

Cyber Threat Analyst

AnaVation is seeking a Cyber Threat Analyst to join our team and support our mis...
Location
Location
United States , Reston
Salary
Salary:
Not provided
anavationllc.com Logo
AnaVation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI Clearance
  • Bachelor’s degree in relevant field and 1-8 years of experience related to specific functional area (May substitute Master’s degree in lieu of 4 years of experience)
  • CompTIA Security+ or equivalent IAT Level II and currently hold or able to obtain CSSP Analyst certification (such as CEH, CySA+, CFR)
  • Working collaboratively across cross-functional teams of all experience levels
  • Experience working collaboratively with staff at all experience levels to deliver short-term, medium-term, and long-term commitments
  • Experience completing and coordinate tasks across cross-functional teams in either a lead or supporting role
  • Ability to provide recommendations for enhancing views of device data in bulk and to view associations of all the data related to those devices
  • Experience leading, developing, and delivering inter-discipline and inter-organizational capabilities and processes to improve performance
  • Technical understanding of classified networks, servers, storage, operating systems, applications, and the full stack of supporting technologies
  • Experience working with reporting, automation, and visualization systems to provide situational awareness and making recommendations to improve cyber threat intelligence and fusion capabilities
Job Responsibility
Job Responsibility
  • Create analysis products based on cyber threat fusion to clearly document significant cyber-attacks or the discovery of new vulnerabilities
  • Focus on collectively building higher value fusion products, expanding effective lines of communication, knowing lanes of responsibility, and building trust in consistently improving capabilities
  • Conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks
  • Analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent
  • Develops technical solutions to complex problems
  • Exercises considerable latitude in determining objectives and approaches to assignment
What we offer
What we offer
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance
Read More
Arrow Right

Senior Cybersecurity Analyst, Threat Hunter

Our cybersecurity and information security teams at IDEXX contribute to a more r...
Location
Location
United States , Westbrook, Maine
Salary
Salary:
120000.00 - 140000.00 USD / Year
idexx.com Logo
IDEXX
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6–10 years of experience in cybersecurity roles
  • Minimum of 3 years dedicated specifically to threat hunting or advanced incident response
  • Bachelor’s degree in computer science, Cybersecurity, Information Technology, or a related field
  • Preferred certifications GCIH (GIAC Certified Incident Handler) and CompTIA CySA+ (Cybersecurity Analyst+) certification
  • Proven, hands-on experience using platform for EDR (Endpoint Detection and Response) and threat hunting
  • Expert-level knowledge of PowerShell Scripting, Python and EDR and SIEM query language is preferred
  • Deep understanding of incident response lifecycles, methodologies, and forensic techniques
  • Strong knowledge of networking protocols, operating systems (Windows, Linux, macOS), and common attack vectors
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation of hunting tasks is a plus
  • Exceptional analytical and problem-solving skills with keen attention to detail
Job Responsibility
Job Responsibility
  • Proactively hunt for indicators of compromise (IOCs) and advanced persistent threats (APTs) across the network, endpoints, and cloud environments using threat intelligence and a hypothesis-driven methodology
  • Conduct in-depth analysis of security events, network traffic, and endpoint data to identify malicious activity and potential breaches
  • Utilize the SIEM and EDR platform extensively, applying expert knowledge of the scripting, SIEM and EDR query language to perform complex searches and data analysis
  • Lead and participate in incident response activities, including containment, eradication, and recovery efforts, serving as a primary escalation point for critical security incidents
  • Develop and refine threat hunting playbooks, procedures, and detection rules to improve the security team’s efficiency and effectiveness
  • Collaborate with the security engineering and security operations center (SOC) teams to integrate new threat intelligence and enhance existing security tools and controls
  • Mentor junior analysts and contribute to the ongoing improvement of the organization's overall security posture
What we offer
What we offer
  • Opportunity for annual cash bonus
  • Health / Dental / Vision Benefits Day-One
  • 5% matching 401k
  • Additional benefits including but not limited to financial support, pet insurance, mental health resources, volunteer paid days off, employee stock program, foundation donation matching
  • Fulltime
Read More
Arrow Right

Threat Intelligence Analyst

As the first US member of the Threat Intelligence team, you’ll be joining a glob...
Location
Location
United States , San Francisco
Salary
Salary:
128300.00 - 206000.00 USD / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2+ years experience in Threat Intelligence roles
  • 3+ years experience in Cyber Security roles
  • Experience generating threat intelligence using behavioural-based threat models, including ATT&CK, Cyber Kill Chain, Diamond Model, etc.
  • Experience using common Threat intelligence tools and platforms like MISP, OpenCTI, etc.
  • Experience performing hunting for Cyber Threat Actors
  • Experience building automation of common security operations tasks
  • You have deep knowledge of cyber threats, attacker TTPs and attack methodologies
  • You have strong communication skills and problem-solving skills, with the ability to analyse complex data.
Job Responsibility
Job Responsibility
  • Conduct proactive research to anticipate and mitigate potential cyber threats and vulnerabilities that target Atlassian and its customers
  • Produce actionable intelligence to the security teams by following the Threat intelligence lifecycle framework
  • Collaborate with the Detections & Response team to provide additional insights during security investigations
  • Develop and maintain threat profiles for key adversaries, including their tactics, techniques, and procedures (TTPs), motivations, and capabilities
  • Participate in threat intelligence sharing initiatives with external partners and industry peers
  • Contribute to the wider threat intelligence community, establishing Atlassian as a key contributor in the space
  • Integrate Threat Intelligence into Atlassian systems and practices
  • Investigate malicious code to extract Tactics, Techniques and Procedures (TTP)
  • Develop and deliver threat briefings to both technical and non-technical audiences.
What we offer
What we offer
  • Health and wellbeing resources
  • Paid volunteer days
  • Equity
  • Bonuses
  • Commissions
  • Flexible work options (onsite, remote, hybrid)
  • Fulltime
Read More
Arrow Right

Lead Threat Intelligence Analyst

We are looking for a Lead Threat Intelligence Analyst. In this role, you'll be a...
Location
Location
Canada , Toronto
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5-7 years of experience in cybersecurity
  • Minimum of 3 years in a dedicated threat intelligence role
  • Strong understanding of the cyber threat landscape, including knowledge of threat actor groups, common attack vectors, and malware families
  • Proven ability to analyze complex data from various sources
  • Familiarity with common threat intelligence frameworks like MITRE ATT&CK, the Cyber Kill Chain, and Diamond Model
  • Excellent written and verbal communication skills
  • Experience with threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and forensic tools
Job Responsibility
Job Responsibility
  • Lead the design, development, and continuous improvement of the organization’s cyber threat intelligence (CTI) program
  • Perform deep-dives into cyber threats, including analyzing malware, understanding adversary tactics, techniques, and procedures (TTPs), and tracking threat actor groups
  • Create and refine threat models and frameworks to predict and prepare for potential attacks
  • Work with our Global Security Operations Center (GSOC), Detection Engineering, Automation Engineers and Incident Response teams to integrate threat intelligence into our detection and prevention systems
  • Generate timely and high-quality intelligence/Threat Landscape reports, risk forecasts and alerts for technical and executive audiences
  • Promote automation of indicator ingestion, correlation, and dissemination across GSOC, Automation and IR platforms
  • Define and track key performance indicators (KPIs) for the threat intelligence program
  • Conduct periodic maturity assessments of the threat intelligence function
  • Provide guidance and mentorship to junior analysts
What we offer
What we offer
  • Medical (HSA & FSA), dental, vision
  • 401(k) with company match
  • Employee stock purchase plan
  • Commuter benefits
  • In-house wellness program
  • Broad learning & development opportunities
  • A charitable giving platform with company match
  • Fitness allowance
  • Employee discount programs
  • Free games & events
  • Fulltime
Read More
Arrow Right

Lead Threat Intelligence Analyst

We are looking for a Lead Threat Intelligence Analyst. In this role, you'll be a...
Location
Location
United States , Las Vegas
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5-7 years of experience in cybersecurity
  • Minimum of 3 years in a dedicated threat intelligence role
  • Strong understanding of the cyber threat landscape, including knowledge of threat actor groups, common attack vectors, and malware families
  • Proven ability to analyze complex data from various sources
  • Familiarity with common threat intelligence frameworks like MITRE ATT&CK, the Cyber Kill Chain, and Diamond Model
  • Excellent written and verbal communication skills
  • Experience with threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and forensic tools
Job Responsibility
Job Responsibility
  • Lead the design, development, and continuous improvement of the organization’s cyber threat intelligence (CTI) program
  • Perform deep-dives into cyber threats, including analyzing malware, understanding adversary tactics, techniques, and procedures (TTPs), and tracking threat actor groups
  • Create and refine threat models and frameworks to predict and prepare for potential attacks
  • Work with our Global Security Operations Center (GSOC), Detection Engineering, Automation Engineers and Incident Response teams to integrate threat intelligence into our detection and prevention systems
  • Generate timely and high-quality intelligence/Threat Landscape reports, risk forecasts and alerts for technical and executive audiences
  • Promote automation of indicator ingestion, correlation, and dissemination across GSOC, Automation and IR platforms
  • Define and track key performance indicators (KPIs) for the threat intelligence program
  • Conduct periodic maturity assessments of the threat intelligence function
  • Provide guidance and mentorship to junior analysts
What we offer
What we offer
  • Medical (HSA & FSA)
  • dental
  • vision
  • 401(k) with company match
  • employee stock purchase plan
  • commuter benefits
  • in-house wellness program
  • broad learning & development opportunities
  • a charitable giving platform with company match
  • Fitness allowance
  • Fulltime
Read More
Arrow Right

Lead Threat Intelligence Analyst

We are looking for a Lead Threat Intelligence Analyst. In this role, you'll be a...
Location
Location
United States , New York
Salary
Salary:
133900.00 - 198160.00 USD / Year
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5-7 years of experience in cybersecurity
  • Minimum of 3 years in a dedicated threat intelligence role
  • Strong understanding of the cyber threat landscape, including knowledge of threat actor groups, common attack vectors, and malware families
  • Proven ability to analyze complex data from various sources (e.g., open-source intelligence, dark web forums, technical reports) to form a cohesive threat picture
  • Familiarity with common threat intelligence frameworks like MITRE ATT&CK, the Cyber Kill Chain, and Diamond Model
  • Excellent written and verbal communication skills, with the ability to present technical information clearly to both technical and non-technical audiences
  • Experience with threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and forensic tools
Job Responsibility
Job Responsibility
  • Lead the design, development, and continuous improvement of the organization’s cyber threat intelligence (CTI) program
  • Perform deep-dives into cyber threats, including analyzing malware, understanding adversary tactics, techniques, and procedures (TTPs), and tracking threat actor groups
  • Create and refine threat models and frameworks to predict and prepare for potential attacks
  • Work with our Global Security Operations Center (GSOC), Detection Engineering, Automation Engineers and Incident Response teams to integrate threat intelligence into our detection and prevention systems
  • Generate timely and high-quality intelligence/Threat Landscape reports, risk forecasts and alerts for technical and executive audiences
  • Promote automation of indicator ingestion, correlation, and dissemination across GSOC, Automation and IR platforms
  • Define and track key performance indicators (KPIs) for the threat intelligence program
  • Conduct periodic maturity assessments of the threat intelligence function
  • Provide guidance and mentorship to junior analysts
What we offer
What we offer
  • Medical (HSA & FSA)
  • dental
  • vision
  • 401(k) with company match
  • employee stock purchase plan
  • commuter benefits
  • in-house wellness program
  • broad learning & development opportunities
  • a charitable giving platform with company match
  • Fitness allowance
  • Fulltime
Read More
Arrow Right

Threat Intelligence Analyst

Join our team as a Threat Intelligence Analyst! We are looking for an amazing ca...
Location
Location
Portugal , Lisbon
Salary
Salary:
Not provided
https://www.inetum.com Logo
Inetum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Deep knowledge of DNS (Domain Name System)
  • Experience with IP (Internet Protocol), including IPv4 and IPv6
  • Familiarity with virtualization in Microsoft environments (MS Virtualization)
  • Proficiency in Microsoft Windows operating systems (7, 8.0, 8.1, 10, 13) and Windows Server
  • Experience with Linux operating systems
  • Analytical and problem-solving skills
Job Responsibility
Job Responsibility
  • Conduct detailed threat analyses to identify and mitigate risks
  • Detect and investigate potential data leaks
  • Analyze activities involving potentially criminal material
  • Monitor and analyze the deep web and dark web to identify emerging threats
  • Produce Indicators of Compromise (IOCs) to strengthen security defenses
  • Perform malware analyses to understand and neutralize threats
  • Fulltime
Read More
Arrow Right