Cyber Intelligence Analyst

Jobgether
2d$84,900 - $157,320Remote

About The Position

This remote role offers the opportunity to operate at the forefront of enterprise cybersecurity, defending critical systems against advanced and evolving threats. As a Cyber Intelligence Analyst, you will analyze endpoint and network data, investigate sophisticated malware, and contribute to rapid incident containment and remediation efforts. You’ll work within a high-performing security environment, leveraging established frameworks and cutting-edge tools to detect, analyze, and neutralize cyber threats. The role combines deep technical investigation with strategic threat modeling and cross-functional collaboration. If you are passionate about malware research, behavioral threat detection, and protecting large-scale infrastructure, this position provides both impact and technical depth.

Requirements

  • Proven experience as a Security Operations Center (SOC) Analyst or in a cybersecurity-focused incident response role.
  • Strong expertise in malware reverse engineering and sandbox analysis, including use of tools such as OllyDbg, Radare, GDB, or similar.
  • Hands-on experience with SIEM technologies and advanced log analysis.
  • Deep understanding of Linux, UNIX, Windows operating systems, TCP/IP networking, firewalls, intrusion prevention systems, and IP routing.
  • Knowledge of advanced persistent threats (APTs), attacker tools, tactics, and procedures targeting enterprise environments.
  • Ability to analyze shellcode and complex malicious algorithms, and create effective detection signatures.
  • Experience in information security research, technical writing, incident response, and risk assessment.
  • Bachelor’s degree preferred or equivalent practical experience.
  • Industry certifications such as GIAC GSEC (401), GCIH (504), GMON (511), or similar are preferred.
  • Public cloud security certifications (AWS, Azure, GCP) are a plus.
  • Must be authorized to work in the United States.

Nice To Haves

  • Industry certifications such as GIAC GSEC (401), GCIH (504), GMON (511), or similar are preferred.
  • Public cloud security certifications (AWS, Azure, GCP) are a plus.

Responsibilities

  • Monitor, identify, and analyze cybersecurity threats across endpoint and network environments using established detection tools and processes.
  • Conduct in-depth malware analysis, including reverse engineering, sandboxing, and examination of packed or obfuscated code.
  • Investigate security incidents, perform containment and remediation activities, and document findings and resolutions thoroughly.
  • Develop host- and network-based signatures to detect malicious activity and recommend heuristic or anomaly-based detection strategies.
  • Apply threat modeling frameworks such as MITRE ATT&CK, Cyber Kill Chain, and Diamond Model to assess adversary tactics and techniques.
  • Utilize SIEM platforms and other security monitoring technologies to correlate events and uncover indicators of compromise.
  • Communicate findings clearly to stakeholders, educating asset owners and teams on risks, mitigation steps, and security best practices.
  • Provide support on a rotating basis to ensure continuous threat monitoring and response readiness.

Benefits

  • Competitive base salary ranging from $84,900 to $157,320 per year, depending on location, skills, and experience.
  • Eligibility for annual short-term and/or long-term incentive compensation programs (performance-based).
  • Comprehensive medical, dental, and vision insurance coverage.
  • Flexible Spending Accounts (FSA) and Health Savings Accounts (HSA).
  • Life insurance, disability income protection, and Employee Assistance Program (EAP).
  • 401(k) retirement savings plan.
  • Paid vacation, holidays, sick leave, and family/medical leave as applicable.
  • Employee stock purchase program at a discounted rate.
  • Fully remote work environment with rotational support structure.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service