CrawlJobs Logo

Threat Intelligence Intern

fsisac.com Logo

FS-ISAC

Location Icon

Location:
United States , Reston

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

This internship will offer direct exposure to the intelligence function at the center of global financial sector cybersecurity, working alongside analysts who track, synthesize, and disseminate threat intelligence to member institutions around the world.

Job Responsibility:

  • Research and analyze cyber threats, threat actors, and campaigns targeting the financial sector using open-source and ISAC-sourced intelligence
  • Contribute to the development of intelligence products and analytical outputs for FS-ISAC members
  • Apply structured analytical frameworks, including MITRE ATT&CK, to assess and organize intelligence findings
  • Monitor threat landscape developments relevant to the financial sector and summarize key findings for internal teams
  • Collaborate with analysts and intelligence professionals across the US and EMEA
  • Present work and findings to senior leadership at the end of the program.

Requirements:

  • Must be a rising junior or senior currently enrolled in an accredited undergraduate program, with a concentration in cybersecurity, information science, political science, international affairs, or a closely related discipline
  • Consumer-level understanding and utilization of AI tools
  • Familiarity with threat intelligence concepts, OSINT methodologies, or the MITRE ATT&CK framework preferred
  • Strong research and analytical writing skills with the ability to synthesize large volumes of information into clear, structured outputs
  • Genuine interest in the financial sector threat landscape, not just cybersecurity broadly
  • Must be authorized to work in the United States
  • A background check is required prior to the start date.

Nice to have:

Familiarity with threat intelligence concepts, OSINT methodologies, or the MITRE ATT&CK framework preferred

Additional Information:

Job Posted:
May 16, 2026

Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Threat Intelligence Intern

Threat Intelligence Research Engineer

We’re looking for a Threat Intelligence Research Engineer who can bridge two wor...
Location
Location
United States , Orlando
Salary
Salary:
Not provided
threatlocker.com Logo
ThreatLocker
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years in cybersecurity research, threat intelligence, security engineering, SOC analysis, or malware analysis
  • Strong knowledge of attacker TTPs, MITRE ATT&CK, malware behavior, incident response, and threat hunting workflows
  • Hands-on familiarity with tools such as SIEMs, sandboxes, EDR platforms, packet analyzers, and OSINT frameworks
  • Ability to read logs, investigate incidents, and interpret technical artifacts
  • Proven experience writing technical reports, threat advisories, security research, or cybersecurity analysis
  • Ability to translate complex material into clear, concise content without losing technical accuracy
  • Strong editorial judgment and an understanding of narrative clarity and structure
  • Deep curiosity and a research-driven mindset
  • Commitment to accuracy, integrity, and evidence-backed analysis
  • Ability to juggle multiple research topics while meeting publishing deadlines
Job Responsibility
Job Responsibility
  • Monitor, analyze, and report on emerging threats, indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs), and global threat trends
  • Investigate vulnerabilities, misconfigurations, malware behavior, ransomware campaigns, and exploit chains
  • Conduct independent research on threat actors, intrusion patterns, and security gaps relevant to our customer base
  • Collaborate with internal engineering, SOC, and threat teams to access proprietary intelligence and validate findings
  • Produce clear, defensible, and high-accuracy analysis based on data and technical evidence
  • Transform threat research into high-quality reports, whitepapers, blogs, briefs, advisories, and thought-leadership content
  • Write in a way that resonates with cybersecurity professionals, executives, and IT leaders
  • Contribute to articles under the names of internal subject matter experts (SMEs) to elevate their voices and strengthen company authority
  • Develop clear visuals, diagrams, and technical explanations to support complex research
  • Ensure all content is technically rigorous, original, and aligned with our Zero Trust security philosophy
Read More
Arrow Right

Senior Cybersecurity Expert (Threat Intelligence)

At Bosch, we shape the future by inventing high-quality technologies and service...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field
  • Several years of experience in a technical cybersecurity role (e.g., CTI, SOC, Threat Hunting, Incident Response, DFIR)
  • Proven expertise in tracking and analyzing adversarial behavior, with strong knowledge of the cyber kill chain and MITRE ATT&CK framework
  • Ability to work methodically and independently while being an effective and reliable team player in a distributed team
  • Excellent communication skills with the ability to translate complex technical findings for diverse stakeholders
  • Strong scripting and tool development experience (Python, APIs, Git, Docker)
  • Fluent in English
  • German is a plus
Job Responsibility
Job Responsibility
  • Identify, analyze, and track threat actor TTPs and IOCs using threat prioritization frameworks and threat landscape monitoring
  • Investigate complex threat data to provide situational awareness, quantify trends, support ongoing investigations, and strengthen detection and response capabilities
  • Conduct in-depth technical analysis (searching, pivoting, enrichment) to support Threat Hunting and identify potential intrusions in Bosch networks and systems
  • Collaborate closely with cross-functional teams including Incident Response and Detection Engineering to integrate intelligence into detection and response workflows
  • Produce and deliver high-quality intelligence reports, briefings, and presentations tailored to technical, business, and executive audiences
  • Respond to Requests for Information (RFIs) and brief stakeholders on emerging campaigns and significant incidents
  • Develop and improve internal tools for threat analysis and monitoring (using Python, REST APIs, Git, Docker)
What we offer
What we offer
  • Competitive salary + annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits (incl. MultiSport, shopping vouchers, cinema tickets, etc.)
  • Prepaid Lunch Card
  • Number of benefits for families (for instance summer camps for kids)
  • Non-working day on the 31st of December
  • Fulltime
Read More
Arrow Right

Protective Intelligence Analyst

The Protective Intelligence Analyst is responsible for monitoring global events,...
Location
Location
United States , Santa Clara
Salary
Salary:
100000.00 USD / Year
aus.com Logo
Allied Universal®
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must possess one of the following: Bachelor’s degree in Security Intelligence, Threat Analysis or related field of study
  • Minimum of seven (7) years of formal civilian or military intelligence analysis experience in which your primary role was as an Intelligence Analyst, supporting the full intelligence cycle.
  • Minimum of five (5) years of civilian or military intelligence analysis experience
  • Fusion Centre/law enforcement/customs/security intelligence/military/commercial intelligence background
  • International experience, cultural awareness and sensitivity
  • Strong research, analysis, and critical thinking skills with expertise in open-source intelligence, social media tools, and assessment techniques to identify and evaluate complex threats
  • Excellent written, oral, and presentation communication abilities, including report writing and briefing senior stakeholders
  • Proficient in Microsoft Office Suite, SharePoint, and other relevant tools for data management and reporting
  • Highly organized, detail-oriented, and capable of managing multiple priorities independently or collaboratively across time zones and compressed timelines
  • Initiative and business acumen with minimal supervision
Job Responsibility
Job Responsibility
  • Manage the “intelligence cycle” through the systematic collection, collation, evaluation, interpretation and analysis of information and process this into timely, accurate, and relevant intelligence
  • Assure quality of intelligence products
  • edit and validate reports prior to dissemination. Evaluate Global Security Operations Center (GSOC) staff basic intelligence work product
  • Assess intel procedures specific to the GSOC
  • develop/update guidance documents and processes to eliminate gaps in intelligence gathering and reporting
  • Responsible for producing intelligence products that will aid in mitigating risk, exposure, and impacts to the client’s corporate critical infrastructure (personnel, facilities and assets, business operations, and reputation), globally.
  • Prepare analyses, assessments, verbal briefs or other products by applying expert judgment and specialized experience in interpreting information and making decisions
  • Produce high-quality threat assessments, security alerts, country risk assessments, multi-media presentations and other relevant security and awareness products for dissemination to relevant audiences across the organization as determined by the Intelligence Analyst under the guidelines provided by Senior Management
  • Take initiative to develop new intelligence products and reporting methods to address emerging vulnerabilities
  • formalize and streamline internal processes
What we offer
What we offer
  • Employee Assistance Program
  • Employee Discount Program
  • Tuition Discount Program
  • Training & Career Development Programs
  • Fulltime
Read More
Arrow Right

Protective Intelligence Analyst

The Protective Intelligence Analyst is responsible for supporting the executive ...
Location
Location
United States , Austin
Salary
Salary:
95000.00 USD / Year
aus.com Logo
Allied Universal®
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A minimum of 3 years of recent protective intelligence experience supporting executive protection teams and principals, or 5+ years of equivalent military, law enforcement, or intelligence experience.
  • Bachelor’s degree in Intelligence Studies, International Relations, Homeland Security, or related field (or equivalent operational experience).
  • Formal Intelligence Training certification (Military, Government, Association, or Private Sector) required.
  • Advanced training in threat assessment, travel risk management, or protective intelligence preferred.
  • Skilled in open-source (OSINT) and social media research, threat monitoring, and incident verification.
  • Experience producing protective intelligence products—threat assessments, travel risk reports, route/residence assessments, and pre-travel advisories.
  • Ability to collect, vet, and analyze information using the intelligence cycle to create accurate, actionable, bias-mitigated reporting.
  • Strong understanding of global security, geopolitical risks, terrorism, crime, and crisis response as they relate to executive travel and operations.
  • Proven ability to support EP operations in real time, providing clear, concise, and timely threat updates to decision-makers.
  • Proficiency in Microsoft Office Suite and familiarity with protective intelligence platforms (e.g., Factal, Dataminr, Babel Street, LifeRaft, Echosec).
Job Responsibility
Job Responsibility
  • Threat Monitoring & Early Warning: Continuously monitor open sources, social media platforms, dark web, and client-specific intelligence tools for threats or hostile surveillance activity directed at principals, their families, residences, travel plans, or affiliated events.
  • Protective Research & Threat Analysis: Conduct in-depth research and analysis on persons of interest (POIs), hostile actors, and groups with the intent or capability to target principals. Assess motivations, capability, opportunity, and intent to identify potential attack indicators.
  • Travel Risk Intelligence: Provide proactive intelligence support to executive protection teams during domestic and international travel, including country risk assessments, route reconnaissance, hotel and venue security reviews, and incident monitoring during trips. Deliver timely updates to traveling principals and EP teams.
  • Protective Operations Support: Deliver actionable, real-time intelligence to EP teams in support of principal movements, protective advances, route planning, and residence/event security. Maintain constant threat environment awareness and communicate relevant changes.
  • Geopolitical & Environmental Risk Tracking: Monitor global and regional security issues, including terrorism, political unrest, crime trends, natural disasters, and health risks—that could affect principals’ safety during travel or at residences/events.
  • Actionable Reporting & Products: Produce timely, clear, and actionable intelligence products including: Threat assessments (strategic and tactical), Travel risk assessments (pre-trip and in-trip updates), Situation reports (SITREPs) and incident summaries, Route and location assessments (residences, hotels, venues, offices)
  • Threat Mitigation Recommendations: Provide practical, proportionate recommendations to EP teams on how to mitigate identified threats, risks, and vulnerabilities. Offer clear triggers and indicators for escalation or operational adjustments.
  • Database & Knowledge Management: Maintain a structured, cross-referenced database of threats, POIs, incidents, and lessons learned to support future operations and ensure continuity of protective intelligence programs.
  • Confidentiality & Security: Safeguard sensitive client information, personal identifiers, and operational details at all times, adhering to strict confidentiality and need-to-know principles.
  • Operational Integration: Serve as the intelligence liaison to executive protection, event security, and corporate security teams, ensuring protective intelligence is integrated into all protective operations.
What we offer
What we offer
  • Employee Assistance Program
  • Employee Discount Program
  • Tuition Discount Program
  • Training & Career Development Programs
  • Fulltime
Read More
Arrow Right

Senior Threat Intelligence Analyst

To deliver timely, actionable threat intelligence that enables the organization ...
Location
Location
Finland , Espoo
Salary
Salary:
5600.00 - 6500.00 EUR / Month
iceye.com Logo
ICEYE
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience (5+ years) in information security, threat intelligence, national CERT/CSIRT, intelligence, or law enforcement environments
  • Extensive hands-on experience (minimum 4 years) using threat intelligence platforms (e.g. MISP) and analysis frameworks such as MITRE ATT&CK in a customer-facing or operational role
  • Strong capability in analyzing infrastructure-related threats and conducting open-source, deep web, and dark web research
  • Demonstrated expertise in utilizing STIX/TAXII feeds and automated intelligence sharing solutions
  • Solid understanding of the Finnish Cyber Security Act (NIS2), GDPR, and applicable local regulations
  • Industry-recognized certifications such as GIAC Cyber Threat Intelligence (GCTI) or equivalent
  • Excellent English communication skills, with the ability to translate complex threat intelligence into actionable insights for diverse audiences
Job Responsibility
Job Responsibility
  • Integrating actionable threat intelligence into SOC, incident response, and vulnerability management workflows to improve detection and response effectiveness
  • Analyzing malicious infrastructure, malware, and adversary artifacts to extract high-fidelity IOCs and map TTPs using frameworks such as MITRE ATT&CK
  • Enabling threat detection, attribution, and information sharing through the effective use of threat intelligence platforms, STIX/TAXII feeds, and automated intelligence sharing mechanisms
  • Producing and disseminating clear, timely operational and tactical intelligence products, including threat briefings, reports, and summaries tailored to technical teams and senior leadership
  • Providing expert intelligence support during major security incidents by correlating external threat data with internal telemetry
  • Enhancing threat hunting activities by supplying contextual intelligence that identifies emerging threats and suspicious behaviors within the environment
  • Delivering actionable cyber resilience recommendations based on threat intelligence and OSINT analysis, aligned with regulatory and legal requirements
What we offer
What we offer
  • Occupational healthcare, occupational, and accident insurance
  • A yearly benefit budget to spend as you wish (i.e. on sport, transport, bike benefit, wellness, lunch, etc.)
  • Phone subscription with iPhone of choice
  • Relocation support (i.e. flight tickets, accommodation, relocation agency support)
  • Time for self-development, research, training, conferences, or certification schemes
  • Inspiring and collaborating offices and silent workspaces enable you to focus
  • Fulltime
Read More
Arrow Right

Senior Threat Intelligence Analyst

Microsoft Customer Success Security is looking for a Senior Threat Intelligence ...
Location
Location
United States , Multiple Locations
Salary
Salary:
139900.00 - 274800.00 USD / Year
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 6+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • OR equivalent experience
  • 5+ years producing finished intelligence content on threat actors and attacker techniques including written reports, presentations, and visuals covering attribution, threat detection and hunting guidance, and remediation recommendations
  • 5+ years leading multi-disciplinary team of threat intelligence analysts leveraging incident response data
  • Proven ability to develop new threat intelligence content types, standards, and processes
  • Expertise in managing customer escalations and complex work streams with quick turnaround deliverables
  • Knowledge of customer requirements across a variety of industries and geos
  • Experience working with engineering resources to develop automated intelligence solutions
Job Responsibility
Job Responsibility
  • Create and track threat intelligence reports to support customers and internal stakeholders
  • Engage with internal stakeholders to ensure threat intelligence content integrates with various product and service groups within Microsoft
  • Ensure threat intelligence deliverables cover critical and time-sensitive threats, as well as creating new reports that close any identified gaps
  • Fulltime
Read More
Arrow Right

Security Intelligence Analyst

Figure is seeking a specialized and proactive Security Intelligence Analyst to j...
Location
Location
United States , San Jose
Salary
Salary:
105000.00 - 145000.00 USD / Year
figure.ai Logo
Figure
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4+ years of equivalent experience
  • Demonstrated experience in intelligence analysis, preferably within protective intelligence, executive protection, or related corporate security environments
  • Strong analytical, problem-solving, and organizational skills with the ability to assess threats specific to executive protection
  • Proficient in utilizing intelligence tools, incident management systems, CCTV, dispatch, and protective intelligence platforms to build POI profiles, case files, and investigative products
Job Responsibility
Job Responsibility
  • Monitor global events and provide real-time intelligence and oversight of Figure operations
  • Integrate internal and external intelligence sources to research, analyze, and aggregate threat data related to executive movements, public appearances, and exposure
  • Conduct protective intelligence assessments to identify individuals, groups, or movements posing potential threats to executives, utilizing research skills and behavioral threat analysis techniques
  • Provide direct intelligence support and coordinate with both in-house and third-party security teams, ensuring actionable threat assessments and real-time situational awareness
  • Utilize social media monitoring, Open Source Intelligence (OSINT), and specialized protective intelligence tools to track potential hostile surveillance, protests, threats, or emerging risks to executives and company operations
  • Compile and report on senior executive travel, including upcoming travel reports and daily executive travel briefings to ensure situational awareness
  • Conduct ad-hoc briefings for senior security leadership on unfolding events impacting executives
  • Develop specialized protective intelligence products such as Executive Threat Profiles, Event Risk Assessments, and Protective Travel Advisories
  • Coordinate with GSOC peers to align global incident responses, escalation procedures, and the dispatch of protective services, providing frontline leadership and infusing protective intelligence capabilities across the wider team
  • Serve as a trusted advisor and backup to the GSOC Lead, as needed
  • Fulltime
Read More
Arrow Right
New

Senior Cyber Threat Intelligence Analyst

BAE Systems is seeking a skilled Cyber Threat Intelligence Practitioner to suppo...
Location
Location
United Kingdom , Preston
Salary
Salary:
27.03 - 36.30 GBP / Hour
outsource-uk.co.uk Logo
Outsource UK
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong experience within a Cyber Threat Intelligence (CTI) discipline
  • A solid understanding of cyber threat actors, geopolitics, and global threat activity
  • Awareness of intelligence disciplines such as OSINT, SIGINT, HUMINT, and their application
  • Knowledge of structured analytical techniques and intelligence best practice
  • Experience applying MITRE ATT&CK / D3FEND / ENGAGE frameworks in an operational context
  • Clearance: BPSS + SC + UK EYES
Job Responsibility
Job Responsibility
  • Produce operational and tactical cyber threat intelligence reports tailored to technical and senior audiences
  • Monitor the cyber threat landscape, including OSINT, dark web sources, internal telemetry, and external intelligence feeds
  • Investigate threat actors, campaigns, and tactics, techniques, and procedures (TTPs) to identify indicators of compromise
  • Provide timely intelligence support during security incidents, aiding containment and remediation efforts
  • Deliver threat briefings to internal stakeholders and trusted external partners
  • Support Requests for Information (RFIs) and Intelligence Requirements (IRs) in collaboration with CTI collections teams
  • Advise on organisational Cyber Threat Levels based on intelligence assessments
  • Act as a trusted advisor, translating complex intelligence into clear, actionable insight
  • Fulltime
Read More
Arrow Right