Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
About The Role
We are seeking a Cyber Threat Intelligence Analyst to capture and explain the evolution of the cyber threat landscape for our customers and the wider market. Your primary focus will be strategic and thematic intelligence: bringing together complex threat signals and research, then turning them into clear, well-reasoned insights that inform leadership decisions and help customers set the right priorities. You will also produce research-backed, publishable analysis and communicate it effectively to both internal and external audiences.
You will work closely with incident response, threat hunting, MDR/SOC, and product development teams to ensure your work reflects real-world observations. This is not a monitoring or feed-processing role. It is a forward-looking role focused on providing decision advantage, guiding priorities, and producing intelligence that has meaningful impact.
What You’ll Do
- Track the threat landscape end‑to‑end. Continuously monitor global and regional threat activity, emerging vulnerabilities and TTPs, and attacker tradecraft to identify what matters most to our business and customers.
- Research and profile adversaries and campaigns. Identify, track, and assess sophisticated threat actors by analyzing their capabilities, infrastructure, objectives, and TTPs.
- Produce strategic & thematic intelligence. Create recurring and ad‑hoc intelligence products such as threat landscape updates, thematic deep dives, actor profiles, ransomware/ecosystem reports, and risk assessments.
- Translate signals into decisions. Correlate OSINT, partner/vendor feeds, telemetry, and technical artifacts (e.g., malware, IOCs) to generate actionable insights and concrete recommendations.
- Brief and present. Prepare and deliver written reports, slide decks, and presentations for technical teams, leadership, customers, and partners; comfortably adapt narrative and depth to the audience.
- Collaborate with industry, LEA and other institutions. Engage with industry partners, participate in collaborative efforts to disrupt threat actor activities, represent WithSecure in trusted forums and events.
- Improve CTI practice. Contribute to collection plans and PIRs, strengthen analytic workflows and knowledge bases, and (at senior level) mentor other analysts.
Required (mid‑level)
- 3–6 years of experience in CTI, SOC/MDR, incident response, threat hunting, malware analysis, or a closely related security role.
- Proven ability to analyze attacker behavior using structured frameworks (MITRE ATT&CK, Kill Chain, Diamond Model) and to assess impact and risk.
- Strong intelligence writing skills: you can turn complex technical findings into clear, well‑structured reports.
- Confident presenter and communicator, comfortable briefing mixed technical and non‑technical audiences.
- Familiarity with common CTI toolchains and methods: TIPs, SIEM/EDR data, OSINT collection, indicator handling (STIX/TAXII), and basic automation.
- Strong proficiency in AI technologies and tools.
- Proven experience in applying AI solutions to solve real-world business or technical challenges.
- Ability to collaborate with cross-functional teams to implement AI-driven initiatives.
- Strong problem-solving skills, analytical thinking, and continuous learning mindset to keep up with evolving AI technologies.
- 6+ years of relevant experience, including ownership of strategic/thematic intel programs and stakeholder engagement.
- Demonstrated ability to set intelligence priorities (PIRs), drive narratives, and influence security or product decisions.
- Experience representing CTI externally — customer briefings, webinars, industry sharing groups, or conference speaking.
- Deep experience in one or more areas: ransomware, financially‑motivated threat groups, cyber‑espionage/APT activity, cloud or identity threats, supply‑chain attacks.
- Scripting/data skills (Python, KQL/SPL, basic graph or link analysis) to scale research and reporting.
- Relevant certifications such as GCTI, GCIA, CISSP, or similar.
Key Skills
Ranked by relevanceReady to apply?
Join WithSecure and take your career to the next level!
Application takes less than 5 minutes

