-
WithSecure

Senior- / Mid-level Cyber Threat Intelligence Analyst

WithSecure
Finland · Full-time · Mid-Senior

At WithSecure™, we protect businesses all over the world. Our SaaS solutions safeguard against modern cyber threats, and our innovative Co-security approach reflects our belief that true protection requires collaboration and shared expertise. No one can solve every cyber security problem alone. Our vision is to become Europe’s flagship in cyber security. Every day, our talented teams work to prevent cyber extortion, secure critical infrastructure, and prevent misuse of sensitive data. At WithSecure, it’s our people who make us exceptional – a diverse community that values passion, purpose, and a commitment to workplace well-being. If you’re ready to make an impact with a company that’s transforming cybersecurity, we’d love to hear from you.

About The Role

We are seeking a Cyber Threat Intelligence Analyst to capture and explain the evolution of the cyber threat landscape for our customers and the wider market. Your primary focus will be strategic and thematic intelligence: bringing together complex threat signals and research, then turning them into clear, well-reasoned insights that inform leadership decisions and help customers set the right priorities. You will also produce research-backed, publishable analysis and communicate it effectively to both internal and external audiences.

You will work closely with incident response, threat hunting, MDR/SOC, and product development teams to ensure your work reflects real-world observations. This is not a monitoring or feed-processing role. It is a forward-looking role focused on providing decision advantage, guiding priorities, and producing intelligence that has meaningful impact.

What You’ll Do

  • Track the threat landscape end‑to‑end. Continuously monitor global and regional threat activity, emerging vulnerabilities and TTPs, and attacker tradecraft to identify what matters most to our business and customers.
  • Research and profile adversaries and campaigns. Identify, track, and assess sophisticated threat actors by analyzing their capabilities, infrastructure, objectives, and TTPs.
  • Produce strategic & thematic intelligence. Create recurring and ad‑hoc intelligence products such as threat landscape updates, thematic deep dives, actor profiles, ransomware/ecosystem reports, and risk assessments.
  • Translate signals into decisions. Correlate OSINT, partner/vendor feeds, telemetry, and technical artifacts (e.g., malware, IOCs) to generate actionable insights and concrete recommendations.
  • Brief and present. Prepare and deliver written reports, slide decks, and presentations for technical teams, leadership, customers, and partners; comfortably adapt narrative and depth to the audience.
  • Collaborate with industry, LEA and other institutions. Engage with industry partners, participate in collaborative efforts to disrupt threat actor activities, represent WithSecure in trusted forums and events.
  • Improve CTI practice. Contribute to collection plans and PIRs, strengthen analytic workflows and knowledge bases, and (at senior level) mentor other analysts.

What You Bring

Required (mid‑level)

  • 3–6 years of experience in CTI, SOC/MDR, incident response, threat hunting, malware analysis, or a closely related security role.
  • Proven ability to analyze attacker behavior using structured frameworks (MITRE ATT&CK, Kill Chain, Diamond Model) and to assess impact and risk.
  • Strong intelligence writing skills: you can turn complex technical findings into clear, well‑structured reports.
  • Confident presenter and communicator, comfortable briefing mixed technical and non‑technical audiences.
  • Familiarity with common CTI toolchains and methods: TIPs, SIEM/EDR data, OSINT collection, indicator handling (STIX/TAXII), and basic automation.
  • Strong proficiency in AI technologies and tools.
  • Proven experience in applying AI solutions to solve real-world business or technical challenges.
  • Ability to collaborate with cross-functional teams to implement AI-driven initiatives.
  • Strong problem-solving skills, analytical thinking, and continuous learning mindset to keep up with evolving AI technologies.

Additional For Senior Level

  • 6+ years of relevant experience, including ownership of strategic/thematic intel programs and stakeholder engagement.
  • Demonstrated ability to set intelligence priorities (PIRs), drive narratives, and influence security or product decisions.
  • Experience representing CTI externally — customer briefings, webinars, industry sharing groups, or conference speaking.

Nice to have

  • Deep experience in one or more areas: ransomware, financially‑motivated threat groups, cyber‑espionage/APT activity, cloud or identity threats, supply‑chain attacks.
  • Scripting/data skills (Python, KQL/SPL, basic graph or link analysis) to scale research and reporting.
  • Relevant certifications such as GCTI, GCIA, CISSP, or similar.

Key Skills

Ranked by relevance

ai incident response cyber security cyber threat intelligence malware analysis cybersecurity python cissp cloud saas
Login to Apply
Posted
Dec 09, 2025
Type
Full-time
Level
Mid-Senior
Location
Helsinki
Company
WithSecure

Industries

IT Services IT Consulting Computer Network Security Software Development

Categories

Information Technology

Related Jobs

3 roles aligned with this opportunity

View all jobs
View Job Details
WithSecure
Related

Senior Incident Response Investigator

2025-12-10

Full-time
Mid-Senior
Finland
IT Services
Other
View Job Details
WithSecure
Related

Cyber Security Advisor

2025-11-07

Full-time
Mid-Senior
Finland
IT Services
Information Technology
View Job Details
WithSecure
Related

Senior Data Analyst – AI-Enabled Insights

2025-11-10

Full-time
Mid-Senior
Finland
IT Services
Information Technology