Threat Intelligence Analyst
VultrFull Time
Mid-level (3 to 4 years), Senior (5 to 8 years)
Candidates should have a BA/BS or equivalent experience in Computer Science, Computer Engineering, Information Security, Security Studies, Intelligence, or a related field. Preferably 5+ years of experience in Information Security and/or Threat Intelligence is required, along with demonstrated experience in technical threat analysis and research. In-depth knowledge of TCP/IP and relevant networking protocols, capability in identifying and tracking infrastructure through methods like banner analysis and metadata correlation, and experience with static and dynamic malware analysis are essential. Proficiency in scripting (Python preferred) and fluency with common CTI research tools such as Maltego, Jupyter Notebook, and the Elastic Stack are necessary. Proven experience applying structured analytical techniques and intelligence methodologies, familiarity with threat modeling and adversary tracking frameworks like MITRE ATT&CK, and a detailed understanding of existing APT groups’ past activities, TTPs, motivations, and targeting patterns are also required. Experience with open-source intelligence-gathering tools and techniques is needed.
The Senior Threat Intelligence Analyst will lead efforts to track state-sponsored APT campaigns, mentor peers in intrusion analysis, and represent Insikt Group externally. Responsibilities include conducting proactive research on state-sponsored APT activity, establishing and refining methods to track APT campaigns, and hunting for threat actor infrastructure and activity across diverse technical data sources. The role involves identifying, prioritizing, and deploying detection mechanisms for command-and-control infrastructure, malware families, and threat groups. Continuously evaluating and improving threat intelligence workflows, staying up to date on evolving APT tradecraft, and mentoring colleagues on intrusion analysis tradecraft and threat intelligence best practices are key duties. Collaboration with geopolitical and regional analysis teams, proposing and evaluating new data sources and analytical methods, and representing Insikt Group externally as a subject matter expert are also part of the role. Additionally, the analyst will collaborate with engineering and data science teams to ensure effective integration of relevant data and analytics into the Recorded Future platform and support customer intelligence needs through Recorded Future’s Analyst-on-Demand service.
Provides machine-readable threat intelligence solutions
Recorded Future provides threat intelligence in the cybersecurity industry by gathering and analyzing information about potential threats to organizations. Their intelligence is delivered in a machine-readable format, making it easy for clients like threat analysts and security teams to integrate with their existing systems. Unlike competitors, Recorded Future focuses on partnerships with Value Added Resellers (VARs) to enhance their offerings and provide comprehensive support. The company's goal is to help organizations lower the risk of cyber attacks through effective threat intelligence.