About The Position

At Crowe, you can build a meaningful and rewarding career. With real flexibility to balance work with life moments, you’re trusted to deliver results and make an impact. We embrace you for who you are, care for your well-being, and nurture your career. Everyone has equitable access to opportunities for career growth and leadership. Over our 80-year history, delivering excellent service through innovation has been a core part of our DNA across our audit, tax, and consulting groups. That’s why we continuously invest in innovative ideas, such as AI-enabled insights and technology-powered solutions, to enhance our services. Join us at Crowe and embark on a career where you can help shape the future of our industry. Job Description: Position Summary Crowe is seeking a detail-oriented and analytically driven Cyber Intelligence Senior Consultant to support our cyber threat intelligence operations. This individual will focus on the collection, evaluation, and analysis of open-source and cyber threat intelligence to help clients proactively manage digital risk. Reporting directly to the Cyber Intelligence Manager, the Senior Consultant will transform complex intelligence into actionable insights and contribute to the development of threat reports, forecasts, and situational assessments.

Requirements

  • Bachelor’s degree in Intelligence Studies, Cybersecurity, Computer Science, or a related field; comparable military training or relevant operational experience may be considered in lieu of formal education.
  • 4–7 years of experience in cyber intelligence, threat analysis, or security operations.
  • Demonstrated ability to synthesize OSINT and technical data into actionable intelligence.
  • Experience with platforms such as Anomali, Recorded Future, MISP, ThreatConnect, or similar.
  • Familiarity with STIX/TAXII, malware analysis fundamentals, and data visualization/reporting tools.
  • Strong analytical and critical thinking skills with attention to detail.
  • Expertise in cyber threat and open-source intelligence collection and analysis.
  • Excellent written and verbal communication for intelligence briefings and reports.
  • Ability to collaborate in fast-paced, cross-functional environments.

Nice To Haves

  • Preferred certifications: GCTI, GREM, CEH, CISSP, or equivalent intelligence tradecraft credentials.
  • Fluency (professional working proficiency or higher) in one or more of the following languages is highly desirable: Mandarin Russian Hebrew Korean Arabic Farsi

Responsibilities

  • Cyber & OSINT Intelligence Collection Conduct open-source intelligence (OSINT) collection across social media, surface web, deep web, and dark web sources.
  • Monitor and analyze cyber threat actor activity, including campaigns, TTPs, and infrastructure using frameworks such as MITRE ATT&CK.
  • Correlate technical indicators (IOCs) with behavioral and contextual information to develop comprehensive threat profiles.
  • Maintain awareness of geopolitical and sector-specific developments that may influence cyber threat activity.
  • Support limited HUMINT collection where applicable through trusted sources or partner collaboration.
  • Intelligence Analysis & Reporting Analyze, evaluate, and interpret data from multiple sources to produce actionable intelligence products.
  • Draft intelligence summaries, situation reports, and risk assessments for internal and client distribution.
  • Support the cyber fusion center by integrating intelligence findings into detection and response workflows.
  • Develop and maintain intelligence requirements and contribute to collection management processes.
  • Collaboration & Cross-Functional Support Work closely with the Cyber Intelligence Manager to align intelligence deliverables with client and organizational objectives.
  • Collaborate with incident response, SOC, and threat-hunting teams to ensure intelligence insights inform operations.
  • Present findings and threat briefings to both internal leadership and external stakeholders.
  • Contribute to continuous improvement of threat intelligence platforms (TIPs) and knowledge management systems.
  • Continuous Learning & Improvement Track and assess emerging technologies, adversary tradecraft, and industry best practices.
  • Participate in peer review processes to maintain high analytical and reporting standards.
  • Assist in automating data collection and enrichment pipelines to improve efficiency and consistency.

Benefits

  • Your exceptional people experience starts here. At Crowe, we know that great people are what makes a great firm. We care about our people and offer employees a comprehensive total rewards package.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service