Threat Intelligence Analyst
VultrFull Time
Mid-level (3 to 4 years), Senior (5 to 8 years)
Candidates should possess a BA/BS or equivalent experience in Computer Science, Computer Engineering, Information Security, Security Studies, Intelligence, or a related field, with a preference for 5+ years of experience in Information Security and/or Threat Intelligence. Required skills include demonstrated experience in technical threat analysis and research, in-depth knowledge of TCP/IP and relevant networking protocols, capability in infrastructure tracking via banner analysis and metadata correlation, and experience with static and dynamic malware analysis. Proficiency in scripting languages like Python and familiarity with CTI research tools such as Maltego, Jupyter Notebook, and the Elastic Stack are necessary. Proven experience applying structured analytical techniques, intelligence methodologies, threat modeling frameworks like MITRE ATT&CK, and a detailed understanding of APT groups' activities, TTPs, motivations, and targeting patterns are essential, along with experience in open-source intelligence gathering.
The Senior Threat Intelligence Analyst will lead efforts to track state-sponsored APT campaigns, mentor peers in intrusion analysis, and represent the company externally. Responsibilities include conducting proactive research on state-sponsored APT activity by synthesizing technical datasets for reporting, establishing and refining methods to track APT campaigns using network, intrusion, and malware analysis, and hunting for threat actor infrastructure and activity across diverse technical data sources. The role involves identifying, prioritizing, and deploying detection mechanisms for command-and-control infrastructure, malware families, and threat groups, while continuously evaluating and improving threat intelligence workflows for automation and efficiency. Staying updated on evolving APT tradecraft, mentoring colleagues, collaborating with geopolitical and regional analysis teams, and proposing new data sources and analytical methods are key duties. The analyst will also represent the company as a subject matter expert through customer briefings, media engagements, or public research dissemination, collaborate with engineering and data science teams for platform integration, and support customer intelligence needs through the Analyst-on-Demand service.
Provides machine-readable threat intelligence solutions
Recorded Future provides threat intelligence in the cybersecurity industry by gathering and analyzing information about potential threats to organizations. Their intelligence is delivered in a machine-readable format, making it easy for clients like threat analysts and security teams to integrate with their existing systems. Unlike competitors, Recorded Future focuses on partnerships with Value Added Resellers (VARs) to enhance their offerings and provide comprehensive support. The company's goal is to help organizations lower the risk of cyber attacks through effective threat intelligence.