Cyber Threat Intelligence Analyst

Cyber Threat Intelligence Analysts research, collect, analyze and report on information about cyber threats to predict future attacks.

Role overview

Cyber Threat Intelligence Analysts use their expert knowledge of malicious software to research and analyze cyber threats, reporting their findings to business leaders, using this intelligence to predict similar attacks, and ultimately helping to counter the activities of cybercriminals for their organization.

Cyber Threat Intelligence Analysts
may also be referred to as:
Cyber Intel Analyst
Cyber Intel Planner
Cyber Intelligence Analyst
Cyber Threat Intelligence Analyst
Cyber Threat Intelligence Intern
Cybercrime Intelligence Analyst
Intelligence Analyst
Threat Intel Analyst
Threat Intelligence Analyst
Threat Intelligence Services Engineer Intern
Threat Warning Analyst

Career Path

Map your career path by understanding role relationships

Average Salary

Based upon experience, salary for this role ranges from:
$116,667
National Average
$128,333
$140,000

Responsibilities

Monitoring and analyzing external and internal cyber threats to assess risk.
Analyzing the likelihood that an emerging threat will impact their organization and identify where weaknesses are.
Delivering reports and recommendations to the business to enable the effectiveness of mitigation and remediation efforts.
Providing requirements to influence threat mitigation strategies.
Analyzing internal risk and security controls to identify existing security weaknesses.
Consolidating cyber threat intelligence feeds and sources.
Providing threat intelligence support to cybersecurity teams during security incidents.

Tools & Environment

Cyber Threat Intelligence Analysts use intrusion detection tools like Snort, Suricata, and Bro, as well as packet inspection tools like WireShark. They also need to use command-and-control, persistence mechanisms, and common network protocols, with an understanding of various scripting and reverse engineering tools.

Certifications

[cyber_job_role_count] Cyber Threat Intelligence Analyst jobs

Resources

Videos

Watch our latest videos, talks an recorded events
Watch

White Papers

Download our whitepapers and printed resources
Learn

Free Courses

Browse our training courses and educational resources
See All

Podcasts

Listen to our podcast features and recorded roundtables
Listen

The CyberSN™ Provider Exchange

The training courses, services, products, and DEI providers you need to take control and accelerate your success.

YOU COULD BE HERE

Get in touch to see your product, training course, service, or DEI support on our provider exchange.
CYBER BUYER

Cyber Security Cloud & SaaS Solutions Outfitter

Invest in Turbo Charging Cyber Security Solutions – Faster Incident Detection, Response and Recovery Times – Get Access To Over 100 New and Emerging Cloud and Cyber Security Software Solutions
Vertex11

Cybersecurity, Risk Management, Continuity of Operations, and Data Protection & Governance

You need expertise to help you manage risk and protect your data from cyber attacks. Whether it’s strategy, cloud security, compliance, or anything in between, Vertex11 is your ultimate resource for getting the job done.
ESCALATE | Point3 Security

Identify Highly Skilled Individuals with ESCALATE Talent Screening

Traditional hiring has a couple of flaws. Human biases prevent good hires. Over-reliance on certifications and years of experience & HR Software and AI often removes top performers. With ESCALATE Talent Screening, your candidates physically demonstrate necessary skills, informing your hiring process far beyond certs or years of experience.
Rapid Ascent, Inc

Ascend with a Career in Cybersecurity

Hands-on, on-the-job training using state-of-the-art AI, gamified live-fire threats with real-world projects, and coaching from industry experts.
CYRISMA

A Cybersecurity SaaS Ecosystem

CYRISMA combines Data Discovery/Data Loss Prevention, Vulnerability Scanning, Configuration Hardening, Score Card Evaluation, Various Reporting and Mitigation planning and Mitigation Execution in a single web-based platform generating Monthly Recurring Revenue for the MSSP.

Get our latest insights. Subscribe to our newsletter.