Logo for Georgia IT, Inc.

Cyber threat intelligence Specialist-Remote

Roles & Responsibilities

  • 5-7 years of cyber threat intelligence experience, with closer to 10 years of overall experience if not CTI-specific.
  • Experience researching and obtaining threat intelligence on activity related to APT groups and nation-states.
  • Experience with structured analysis techniques (Diamond Model, Cyber Kill Chain) and a solid understanding of the MITRE ATT&CK framework; OSINT experience.
  • Experience with graphical link analysis tools (Maltego, Analyst's Notebook, Palantir) and practical knowledge of threat intelligence management platforms (ThreatQ, Anomali, MISP, Recorded Future); certifications such as SANS GCTI, GCFA, GREM are a plus.

Requirements:

  • Serve as day-to-day intelligence analyst, reviewing alerts with CTI technologies and preparing written intelligence products.
  • Provide analytic presentations and summaries to key decision-makers in the client's leadership chain.
  • Participate in threat intelligence sharing calls with government and law enforcement partners.

Job description


Cyber threat intelligence Specialist
Location: Raritan, NJ (Remote or Hybrid)
Duration: 10 Months


Job functions:
  • Looking for a contractor to join the team with intermediate to advanced cyber threat intelligence skills.
  • The contractor will function as a day-to-day intelligence analyst, Will be working with the CTI technologies to review alerts, Prepare written intelligence products
  • Provide analytic presentations and summaries to key decisionmakers in client's leadership chain,
  • Participate in threat intelligence sharing calls with the government and law enforcement partners.
Required Skills:
  • Looking for 5-7 years of cyber threat intelligence specific experience, with closer to 10 years of experience as a whole if it is not CTI-specific.
  • Prior experience researching and obtaining threat intelligence on activity related to APT groups and nation states.
  • Experience with structured analysis techniques (Diamond Model, Cyber Kill Chain) as well as a solid understanding of the MITRE Telecommunication&CK framework is required.
  • Experience performing OSINT research is required.
  • Experience with graphical link analysis tools (Maltego, Analyst Notebook, Palantir) is preferred.
  • Practical knowledge with threat intelligence management platforms (ThreatQ, Anomali, MISP, Recorded Future)
  • Certifications such as Sans GCTI, GCFA, GREM that would be a plus.

Cyber Threat Intelligence Analyst Related jobs

Other jobs at Georgia IT, Inc.

We help you get seen. Not ignored.

We help you get seen faster — by the right people.

🚀

Auto-Apply

We apply for you — automatically and instantly.

Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

✨

AI Match Feedback

Know your real match before you apply.

Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

Upgrade to Premium. Apply smarter and get noticed.

Upgrade to Premium

Join thousands of professionals who got noticed and hired faster.