Staff Threat Intelligence Analyst
HuntressFull Time
Senior (5 to 8 years)
Key technologies and capabilities for this role
Common questions about this position
Candidates need 2+ years of relevant work experience in Cybersecurity, Threat Intelligence, or Security Operations, plus 2+ years of customer-facing experience in engineering or consulting. Experience with SIEMs and security tools like TIPs, Incident Management, Vulnerability Management, SOAR, EDR, and Automation is required, along with tool experience in products such as Palo Alto XSOAR, Splunk SOAR, Swimlane, Rapid7, or ServiceNow SecOps/Vu.
The role involves identifying, developing, and delivering consulting services like design offerings, architecture reviews, use case development, and vulnerability analysis. This includes providing workshops, scoping custom solutions using the Recorded Future API, managing multiple projects, and creating use cases and playbooks for customer environments.
This information is not specified in the job description.
This information is not specified in the job description.
A strong candidate will have hands-on experience with customer workflows in Incident Response, Threat Intel, and Vulnerability Management, plus proficiency in implementing solutions with SIEMs, SOAR tools, and the Recorded Future API in fast-paced environments.
Provides machine-readable threat intelligence solutions
Recorded Future provides threat intelligence in the cybersecurity industry by gathering and analyzing information about potential threats to organizations. Their intelligence is delivered in a machine-readable format, making it easy for clients like threat analysts and security teams to integrate with their existing systems. Unlike competitors, Recorded Future focuses on partnerships with Value Added Resellers (VARs) to enhance their offerings and provide comprehensive support. The company's goal is to help organizations lower the risk of cyber attacks through effective threat intelligence.