Senior Analyst, Threat Intelligence – Incident Response

Posted 42ds ago

Employment Information

Industry
Education
Salary
Experience
Job Type

Report this job

Job expired or something wrong with this job?

Job Description

Senior Threat Intelligence & Incident Response Analyst leading proactive investigations and threat assessments. Engaging with global security and compliance teams in a fully remote role.

Responsibilities:

  • Lead proactive threat hunting, threat intelligence, and incident response activities
  • Conduct hypothesis-driven threat hunts, including attack path and exposure-based analysis across endpoint, identity, cloud, and network telemetry
  • Rapidly assess, investigate, and respond to high-priority security events
  • Analyze adversary behavior using the MITRE ATT&CK framework and real-world threat activity
  • Partner with Vulnerability Management to apply threat intelligence to vulnerability prioritization, risk assessment, and remediation workflows based on exploitability and enterprise exposure
  • Support exposure management initiatives by identifying attack paths, misconfigurations, and chained weaknesses within the technology stack
  • Translate intelligence findings and hunt insights into actionable response guidance and security recommendations
  • Collaborate with SOC, Privacy, Legal, Compliance, IT, CrowdStrike, Vulnerability Management, and business stakeholders to coordinate investigations and risk-driven response efforts
  • Produce clear, executive-level documentation and incident briefings for senior leadership

Requirements:

  • 5+ years of experience in Threat Intelligence, Threat Hunting, or Incident Response roles
  • Proven experience leading investigations and proactive security analysis in enterprise environments
  • Strong hands-on experience with EDR platforms and SIEM/log analytics tools
  • Deep understanding of vulnerability exploitation, exposure management, and attack path analysis
  • Strong knowledge of adversary tradecraft and modern intrusion techniques
  • Demonstrated ability to operate independently and make sound decisions under pressure
  • Strong written and verbal communication skills
  • Bachelor’s degree in Cybersecurity or related field (or equivalent experience)
  • 5+ years of hands-on Threat Intelligence, Threat Hunting, or Incident Response experience may substitute for formal education
  • Industry certifications preferred but not required, including: GIAC (GCIA, GCIH, GCED, GCIR, GNFA, GCFA) OSCP / OSCE CRTO / CRTP CRTA DFIR-focused certifications (GCFA, GNFA, CFCE, EnCE)

Benefits:

  • Professional development opportunities