Senior Analyst, Threat Intelligence – Incident Response
Posted 42ds ago
Employment Information
Report this job
Job expired or something wrong with this job?
Job Description
Senior Threat Intelligence & Incident Response Analyst leading proactive investigations and threat assessments. Engaging with global security and compliance teams in a fully remote role.
Responsibilities:
- Lead proactive threat hunting, threat intelligence, and incident response activities
- Conduct hypothesis-driven threat hunts, including attack path and exposure-based analysis across endpoint, identity, cloud, and network telemetry
- Rapidly assess, investigate, and respond to high-priority security events
- Analyze adversary behavior using the MITRE ATT&CK framework and real-world threat activity
- Partner with Vulnerability Management to apply threat intelligence to vulnerability prioritization, risk assessment, and remediation workflows based on exploitability and enterprise exposure
- Support exposure management initiatives by identifying attack paths, misconfigurations, and chained weaknesses within the technology stack
- Translate intelligence findings and hunt insights into actionable response guidance and security recommendations
- Collaborate with SOC, Privacy, Legal, Compliance, IT, CrowdStrike, Vulnerability Management, and business stakeholders to coordinate investigations and risk-driven response efforts
- Produce clear, executive-level documentation and incident briefings for senior leadership
Requirements:
- 5+ years of experience in Threat Intelligence, Threat Hunting, or Incident Response roles
- Proven experience leading investigations and proactive security analysis in enterprise environments
- Strong hands-on experience with EDR platforms and SIEM/log analytics tools
- Deep understanding of vulnerability exploitation, exposure management, and attack path analysis
- Strong knowledge of adversary tradecraft and modern intrusion techniques
- Demonstrated ability to operate independently and make sound decisions under pressure
- Strong written and verbal communication skills
- Bachelor’s degree in Cybersecurity or related field (or equivalent experience)
- 5+ years of hands-on Threat Intelligence, Threat Hunting, or Incident Response experience may substitute for formal education
- Industry certifications preferred but not required, including: GIAC (GCIA, GCIH, GCED, GCIR, GNFA, GCFA) OSCP / OSCE CRTO / CRTP CRTA DFIR-focused certifications (GCFA, GNFA, CFCE, EnCE)
Benefits:
- Professional development opportunities



















