Role Summary: The CTI Analyst is responsible for collecting, analyzing, enriching, and producing actionable cyber threat intelligence to support security operations, incident response, and executive decisionmaking.
Key Responsibilities
Collect, enrich, and analyze threat intelligence from OSINT, deep/dark web, commercial feeds, internal sensors, and regulator sources.
Produce strategic, operational, tactical, sectorspecific, and vulnerability intelligence reports.
Deliver IoCs, IoBs, TTPs, YARA/Sigma rules, and threat hunting packages to SOC/DFIR teams.
Track and profile threat actors, malware families, campaigns, and emerging threats.
Support incident response with contextual intelligence, attribution insights, and enrichment.
Respond to RFI (Request for Intelligence) submissions with tailored, actionable outputs.
Maintain and update Intelligence Requirements (IRs), PIRs, and collection management frameworks.
Monitor the global and sectorspecific threat landscape continuously (24/7/365 service context).
Required Skills
Strong understanding of MITRE ATT&CK, Diamond Model, and threat actor lifecycle.
Skilled in researching and enriching IoCs, IoBs, and malware indicators.
Experience with threat intelligence platforms, OSINT tools, and dark web monitoring.
Ability to transform raw data into actionable intelligence for SOC, DFIR, and leadership.
Strong written communication skills for both technical and executivelevel reporting.
Preferred Experience & Certifications
26 years of experience in CTI, SOC, DFIR, or security analysis roles.
Certifications such as GCTI, FOR578, CySA+, CISSP, or equivalent.