CrawlJobs Logo

Threat Analyst

threatlocker.com Logo

ThreatLocker

Location Icon

Location:
United States , Orlando

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Threat Analyst is responsible for identifying, investigating, and responding to cyber threats, vulnerabilities, and security incidents across the organization’s systems and networks. This role focuses on proactive monitoring and quick response to security events to protect the organization's data and critical infrastructure.

Job Responsibility:

  • Monitor security tools and systems (SIEM, IDS/IPS, EDR, etc.) for suspicious activity or breaches
  • Analyze security alerts and data to identify potential threats, vulnerabilities, and compromises
  • Build and refine detection capabilities using security tools, threat intelligence, and machine learning models
  • Lead and participate in the response to security incidents (investigating, containing, eradicating, and recovering from threats)
  • Collaborate with cross-functional teams to develop incident handling processes and ensure timely remediation
  • Create detailed post-incident reports, including root cause analysis and recommendations for improvements
  • Develop automated tools and scripts to enhance security detection capabilities and streamline threat detection workflows
  • Maintain and enhance detection tools, including writing custom SNORT, SIGMA, and YARA rules, and updating rulesets in accordance with new threats
  • Conduct forensic analysis and threat hunting to identify malicious activity
  • Review logs from various systems (e.g., firewalls, servers, network devices) to uncover unauthorized activities
  • Research and stay current on emerging threats, vulnerabilities, and cyber-attack techniques
  • Contribute to the enhancement of security monitoring tools, processes, and playbooks
  • Develop automated scripts and tools to improve detection and response efficiency
  • Work closely with DevOps, Network, and Security Engineering teams to ensure secure architectures and systems
  • Leverage internal and external threat intelligence sources to stay informed about the latest security trends and threats
  • Share insights with internal stakeholders to ensure proactive measures are in place
  • Ensure security processes and procedures align with regulatory requirements and industry best practices (e.g., NIST, CIS, ISO 27001)
  • Assist in the preparation of audit reports and security assessments
  • Aggregate, process, and disseminate threat intelligence as it relates to a rapidly evolving threat landscape
  • Monitor various threat intelligence feeds (open and closed source) for emerging threats and malware variants
  • Have a high level of interaction with the ThreatLocker malware analysis network to detonate, analyze, and extract telemetry to evaluate against existing product detections and controls
  • Identify and report visibility gaps to the designated Threat Specialist for additional analysis and content creation

Requirements:

  • 3 years of experience in Information Technology with 1 year of specialized work in any of the following IT domains: Active Directory
  • Application Development
  • Network Administration
  • Information Security
  • Experience with virtual machines on VirtualBox, Workstation Pro (Type 2 hypervisor)
  • Bare-metal (type 1) hypervisor experience (ESXi, HyperV) ++
  • Foundational knowledge of Active Directory infrastructure
  • Proficient in PowerShell and Python
  • Strong understanding of foundational Windows OS components: Windows Firewall, Windows Event Logs, Windows file structure, PowerShell
  • Strong understanding of networking and security principles: RFC 1918, DNS, well-known ports, TCP/IP, CIA triad and its relevance to Information Security, AAA Framework
  • Familiar with MITRE ATT&CK framework
  • Familiar with Cybersecurity technologies and their applications: SIEM, IDS/IPS, NGFW, SOAR, EDR
  • Excellent analytical and problem-solving skills
  • Ability to communicate effectively
  • Self-starting mentality
  • Critical thinking
  • Ability to work in a high-pressure environment
  • Ability to collaborate and work effectively in a team setting
  • Strong time management skills with an ability to meet time sensitive deadlines
  • Confidence in conveying professional opinions about product functionality and roadmap
  • Relevant certifications: Network+, Security+, CySa+, GSEC, GCIA
  • Strong familiarity with SIEM tools, EDR tools, and IDS/IPS systems
  • Knowledge of network security technologies and protocols (TCP/IP, DNS, VPNs, firewalls, etc.)
  • Proficiency in scripting languages such as Python, PowerShell, or Bash
  • Proficiency in custom SNORT, SIGMA, and YARA rule creation
  • Understanding of malware behavior, attack vectors, and vulnerability exploitation techniques

Nice to have:

  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Security Essentials Certification (GSEC)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Ethical Hacker (CEH)
  • OffSec Certified Professional (OSCP)
  • CompTIA Certs: Security +, Network +, Pentest +, CASP+

Additional Information:

Job Posted:
January 06, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Threat Analyst

Threat Analyst

BioCatch is the leader in Behavioral Biometrics, a technology that leverages mac...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
biocatch.com Logo
BioCatch
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A bachelors / graduate degree in Computer Science/Mathematics/Statistics/related field
  • Experience with financial institutions’ fraud departments and/or fraud monitoring tools
  • Experience working within cross-functional teams
  • Experience with SQL to an intermediate/advanced level
  • Experience with Python and/or R (advantage)
  • Understanding of statistical modeling techniques
  • Strong presentation skills with a proven record of presenting to a range of audience types
  • Great business and customer relationships
  • Good communications and teamwork
  • Self and quick learner
Job Responsibility
Job Responsibility
  • Maintain strong relationships with fellow fraud fighters within the BioCatch customer base to support and enable them to get maximum value out of the BioCatch solutions
  • Provide subject matter expertise (SME) support to our customers to drive the use of BioCatch in achieving their strategic plans
  • Work with customers and BioCatch Data Science to continually strive for high fraud detection rates, whilst maintaining low levels of friction for genuine customers
  • Use a data-driven approach to prove the value of BioCatch against success criteria for proof of value and pilot projects
  • Educate potential and new customers on BioCatch and Behavioural Biometrics specifically for targeting their key problems and use cases
  • Work tactically with customers to deploy rules for acute fraud attacks
  • Continually focus on leading customers towards best practices
  • Be a voice of the customer to internal BioCatch functions to drive our own product strategy and delivery
  • Support BioCatch Data Science in researching new and emerging threats across our main use cases including Account Takeover, Account Opening, Remote Access Scams, Social Engineering Scams and Mule detection
  • Deliver reporting and insights on fraud detection performance
  • Fulltime
Read More
Arrow Right

Lead IT Threat Hunt Analyst

The Lead IT Threat Hunt Analyst proactively identifies and neutralizes cyber thr...
Location
Location
United States
Salary
Salary:
103700.00 - 134460.00 USD / Year
amtrak.com Logo
AMTRAK
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s Degree in Computer Science, Information Systems, or related field
  • Professional security‐related certifications (e.g. GIAC Certified Forensic Analyst (GCFA), Certified Information Systems Security Professional (CISSP), or equivalent)
  • Enterprise security experience in threat intelligence, investigative and hunt methodologies, detection engineering, security operations and/or incident response
  • Knowledge of Mitre ATT&CK matrices (Enterprise, ICS, Cloud) to map adversary tactics, techniques and procedures (TTPs) and inform structured hunts
  • Knowledge of OS triage artifact analysis and incident investigative methods
  • Strong analytical skills and proficiency with SIEM, EDR, CASB, IDS/IPS, AV, DLP UEBA, FW, and forensic investigative technologies
  • Ability to design and review multi-source correlation queries using Kusto, Kibana and/or Structured query languages, across endpoint, cloud, network, application and identity data
Job Responsibility
Job Responsibility
  • Conduct proactive, intelligence-driven threat hunts to identify adversary activity, cyber risks and anomalies, identifying and investigating potential threats to critical infrastructure and operations
  • Evaluate, analyze and synthesize large quantities of data to uncover anomalous activity capable of introducing risk to Amtrak environments
  • Search for potential vulnerability exploitation, post-compromise activity or security control gaps based on emerging and known adversary tactics, techniques and procedures (TTPs), user behavior, endpoint threat detection, network behavior analytics, machine learning-derived trends and external threat reports
  • Review EDR telemetry, Firewall, IDS/IPS logs, web content filtering logs, net flow device logs, antivirus logs
  • Work closely with other cybersecurity teams (detection engineering, threat intelligence, incident response and security operations) and operational technology service owners to escalate anomalous findings, contribute to detection logic improvements and verify security control implementations
  • Support and participate in formal reporting related to threat hunt findings, implementation of security controls and improvements to Cyber Security Operations processes
  • Capture hunt byproducts indicative of poor cyber hygiene practices, company policy violation or misuse
  • support incident investigations, as needed
  • Participate in the evaluation and recommendation of hardware and software systems that provide security functions
  • Respond and resolve problems, security incidents and forensic investigations, as needed
What we offer
What we offer
  • health, dental, and vision plans
  • health savings accounts
  • wellness programs
  • flexible spending accounts
  • 401K retirement plan with employer match
  • life insurance
  • short and long term disability insurance
  • paid time off
  • back-up care
  • adoption assistance
  • Fulltime
Read More
Arrow Right

Cyber Threat Analyst

Altamira is searching for Foreign Cyber Threat Analyst in the Chantilly, VA area...
Location
Location
United States , Chantilly
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelors Degree in Cybersecurity or related field
  • Must be a U.S. Citizen
  • Active TS/SCI Clearance w/ CI Poly
  • Preferred 10+ years of Cyber Threat analysis fusion from multiple data sources
Job Responsibility
Job Responsibility
  • Provide cyber threat intelligence assessments, data, briefings, and information to support the National Space Intelligence Center (NSIC)
  • Analyze potential cyber threats to space-based systems and services
  • Analysis of the risks and trends associated with threats to space-based systems and services
  • Prepare and present briefings on cyber threat intelligence topics to various organizations and committees
  • Recommend mitigations to the cyber threats identified
  • Coordinate with Government representatives from multiple agencies and committees
  • Provide comprehensive analysis of current events
Read More
Arrow Right

Cyber Threat Analyst

AnaVation is seeking a Cyber Threat Analyst to join our team and support our mis...
Location
Location
United States , Reston
Salary
Salary:
Not provided
anavationllc.com Logo
AnaVation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI Clearance
  • Bachelor’s degree in relevant field and 1-8 years of experience related to specific functional area (May substitute Master’s degree in lieu of 4 years of experience)
  • CompTIA Security+ or equivalent IAT Level II and currently hold or able to obtain CSSP Analyst certification (such as CEH, CySA+, CFR)
  • Working collaboratively across cross-functional teams of all experience levels
  • Experience working collaboratively with staff at all experience levels to deliver short-term, medium-term, and long-term commitments
  • Experience completing and coordinate tasks across cross-functional teams in either a lead or supporting role
  • Ability to provide recommendations for enhancing views of device data in bulk and to view associations of all the data related to those devices
  • Experience leading, developing, and delivering inter-discipline and inter-organizational capabilities and processes to improve performance
  • Technical understanding of classified networks, servers, storage, operating systems, applications, and the full stack of supporting technologies
  • Experience working with reporting, automation, and visualization systems to provide situational awareness and making recommendations to improve cyber threat intelligence and fusion capabilities
Job Responsibility
Job Responsibility
  • Create analysis products based on cyber threat fusion to clearly document significant cyber-attacks or the discovery of new vulnerabilities
  • Focus on collectively building higher value fusion products, expanding effective lines of communication, knowing lanes of responsibility, and building trust in consistently improving capabilities
  • Conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks
  • Analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent
  • Develops technical solutions to complex problems
  • Exercises considerable latitude in determining objectives and approaches to assignment
What we offer
What we offer
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance
Read More
Arrow Right

Senior Cybersecurity Analyst, Threat Hunter

Our cybersecurity and information security teams at IDEXX contribute to a more r...
Location
Location
United States , Westbrook, Maine
Salary
Salary:
120000.00 - 140000.00 USD / Year
idexx.com Logo
IDEXX
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6–10 years of experience in cybersecurity roles
  • Minimum of 3 years dedicated specifically to threat hunting or advanced incident response
  • Bachelor’s degree in computer science, Cybersecurity, Information Technology, or a related field
  • Preferred certifications GCIH (GIAC Certified Incident Handler) and CompTIA CySA+ (Cybersecurity Analyst+) certification
  • Proven, hands-on experience using platform for EDR (Endpoint Detection and Response) and threat hunting
  • Expert-level knowledge of PowerShell Scripting, Python and EDR and SIEM query language is preferred
  • Deep understanding of incident response lifecycles, methodologies, and forensic techniques
  • Strong knowledge of networking protocols, operating systems (Windows, Linux, macOS), and common attack vectors
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation of hunting tasks is a plus
  • Exceptional analytical and problem-solving skills with keen attention to detail
Job Responsibility
Job Responsibility
  • Proactively hunt for indicators of compromise (IOCs) and advanced persistent threats (APTs) across the network, endpoints, and cloud environments using threat intelligence and a hypothesis-driven methodology
  • Conduct in-depth analysis of security events, network traffic, and endpoint data to identify malicious activity and potential breaches
  • Utilize the SIEM and EDR platform extensively, applying expert knowledge of the scripting, SIEM and EDR query language to perform complex searches and data analysis
  • Lead and participate in incident response activities, including containment, eradication, and recovery efforts, serving as a primary escalation point for critical security incidents
  • Develop and refine threat hunting playbooks, procedures, and detection rules to improve the security team’s efficiency and effectiveness
  • Collaborate with the security engineering and security operations center (SOC) teams to integrate new threat intelligence and enhance existing security tools and controls
  • Mentor junior analysts and contribute to the ongoing improvement of the organization's overall security posture
What we offer
What we offer
  • Opportunity for annual cash bonus
  • Health / Dental / Vision Benefits Day-One
  • 5% matching 401k
  • Additional benefits including but not limited to financial support, pet insurance, mental health resources, volunteer paid days off, employee stock program, foundation donation matching
  • Fulltime
Read More
Arrow Right

Threat Intelligence Analyst

As the first US member of the Threat Intelligence team, you’ll be joining a glob...
Location
Location
United States , San Francisco
Salary
Salary:
128300.00 - 206000.00 USD / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2+ years experience in Threat Intelligence roles
  • 3+ years experience in Cyber Security roles
  • Experience generating threat intelligence using behavioural-based threat models, including ATT&CK, Cyber Kill Chain, Diamond Model, etc.
  • Experience using common Threat intelligence tools and platforms like MISP, OpenCTI, etc.
  • Experience performing hunting for Cyber Threat Actors
  • Experience building automation of common security operations tasks
  • You have deep knowledge of cyber threats, attacker TTPs and attack methodologies
  • You have strong communication skills and problem-solving skills, with the ability to analyse complex data.
Job Responsibility
Job Responsibility
  • Conduct proactive research to anticipate and mitigate potential cyber threats and vulnerabilities that target Atlassian and its customers
  • Produce actionable intelligence to the security teams by following the Threat intelligence lifecycle framework
  • Collaborate with the Detections & Response team to provide additional insights during security investigations
  • Develop and maintain threat profiles for key adversaries, including their tactics, techniques, and procedures (TTPs), motivations, and capabilities
  • Participate in threat intelligence sharing initiatives with external partners and industry peers
  • Contribute to the wider threat intelligence community, establishing Atlassian as a key contributor in the space
  • Integrate Threat Intelligence into Atlassian systems and practices
  • Investigate malicious code to extract Tactics, Techniques and Procedures (TTP)
  • Develop and deliver threat briefings to both technical and non-technical audiences.
What we offer
What we offer
  • Health and wellbeing resources
  • Paid volunteer days
  • Equity
  • Bonuses
  • Commissions
  • Flexible work options (onsite, remote, hybrid)
  • Fulltime
Read More
Arrow Right

Lead Threat Intelligence Analyst

We are looking for a Lead Threat Intelligence Analyst. In this role, you'll be a...
Location
Location
Canada , Toronto
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5-7 years of experience in cybersecurity
  • Minimum of 3 years in a dedicated threat intelligence role
  • Strong understanding of the cyber threat landscape, including knowledge of threat actor groups, common attack vectors, and malware families
  • Proven ability to analyze complex data from various sources
  • Familiarity with common threat intelligence frameworks like MITRE ATT&CK, the Cyber Kill Chain, and Diamond Model
  • Excellent written and verbal communication skills
  • Experience with threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and forensic tools
Job Responsibility
Job Responsibility
  • Lead the design, development, and continuous improvement of the organization’s cyber threat intelligence (CTI) program
  • Perform deep-dives into cyber threats, including analyzing malware, understanding adversary tactics, techniques, and procedures (TTPs), and tracking threat actor groups
  • Create and refine threat models and frameworks to predict and prepare for potential attacks
  • Work with our Global Security Operations Center (GSOC), Detection Engineering, Automation Engineers and Incident Response teams to integrate threat intelligence into our detection and prevention systems
  • Generate timely and high-quality intelligence/Threat Landscape reports, risk forecasts and alerts for technical and executive audiences
  • Promote automation of indicator ingestion, correlation, and dissemination across GSOC, Automation and IR platforms
  • Define and track key performance indicators (KPIs) for the threat intelligence program
  • Conduct periodic maturity assessments of the threat intelligence function
  • Provide guidance and mentorship to junior analysts
What we offer
What we offer
  • Medical (HSA & FSA), dental, vision
  • 401(k) with company match
  • Employee stock purchase plan
  • Commuter benefits
  • In-house wellness program
  • Broad learning & development opportunities
  • A charitable giving platform with company match
  • Fitness allowance
  • Employee discount programs
  • Free games & events
  • Fulltime
Read More
Arrow Right

Lead Threat Intelligence Analyst

We are looking for a Lead Threat Intelligence Analyst. In this role, you'll be a...
Location
Location
United States , Las Vegas
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5-7 years of experience in cybersecurity
  • Minimum of 3 years in a dedicated threat intelligence role
  • Strong understanding of the cyber threat landscape, including knowledge of threat actor groups, common attack vectors, and malware families
  • Proven ability to analyze complex data from various sources
  • Familiarity with common threat intelligence frameworks like MITRE ATT&CK, the Cyber Kill Chain, and Diamond Model
  • Excellent written and verbal communication skills
  • Experience with threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and forensic tools
Job Responsibility
Job Responsibility
  • Lead the design, development, and continuous improvement of the organization’s cyber threat intelligence (CTI) program
  • Perform deep-dives into cyber threats, including analyzing malware, understanding adversary tactics, techniques, and procedures (TTPs), and tracking threat actor groups
  • Create and refine threat models and frameworks to predict and prepare for potential attacks
  • Work with our Global Security Operations Center (GSOC), Detection Engineering, Automation Engineers and Incident Response teams to integrate threat intelligence into our detection and prevention systems
  • Generate timely and high-quality intelligence/Threat Landscape reports, risk forecasts and alerts for technical and executive audiences
  • Promote automation of indicator ingestion, correlation, and dissemination across GSOC, Automation and IR platforms
  • Define and track key performance indicators (KPIs) for the threat intelligence program
  • Conduct periodic maturity assessments of the threat intelligence function
  • Provide guidance and mentorship to junior analysts
What we offer
What we offer
  • Medical (HSA & FSA)
  • dental
  • vision
  • 401(k) with company match
  • employee stock purchase plan
  • commuter benefits
  • in-house wellness program
  • broad learning & development opportunities
  • a charitable giving platform with company match
  • Fitness allowance
  • Fulltime
Read More
Arrow Right