Cyber Intelligence Senior Consultant

Crowe LLP
17d$84,700 - $168,900

About The Position

Crowe is seeking a detail-oriented and analytically driven Cyber Intelligence Senior Consultant to support our cyber threat intelligence operations. This individual will focus on the collection, evaluation, and analysis of open-source and cyber threat intelligence to help clients proactively manage digital risk. Reporting directly to the Cyber Intelligence Manager, the Senior Consultant will transform complex intelligence into actionable insights and contribute to the development of threat reports, forecasts, and situational assessments.

Requirements

  • Bachelor’s degree in Intelligence Studies, Cybersecurity, Computer Science, or a related field; comparable military training or relevant operational experience may be considered in lieu of formal education.
  • 4–7 years of experience in cyber intelligence, threat analysis, or security operations.
  • Demonstrated ability to synthesize OSINT and technical data into actionable intelligence.
  • Experience with platforms such as Anomali, Recorded Future, MISP, ThreatConnect, or similar.
  • Familiarity with STIX/TAXII, malware analysis fundamentals, and data visualization/reporting tools.
  • Strong analytical and critical thinking skills with attention to detail.
  • Expertise in cyber threat and open-source intelligence collection and analysis.
  • Excellent written and verbal communication for intelligence briefings and reports.
  • Ability to collaborate in fast-paced, cross-functional environments.

Nice To Haves

  • Preferred certifications: GCTI, GREM, CEH, CISSP, or equivalent intelligence tradecraft credentials.
  • Fluency (professional working proficiency or higher) in one or more of the following languages is highly desirable:
  • Mandarin
  • Russian
  • Hebrew
  • Korean
  • Arabic
  • Farsi

Responsibilities

  • Cyber & OSINT Intelligence Collection
  • Conduct open-source intelligence (OSINT) collection across social media, surface web, deep web, and dark web sources.
  • Monitor and analyze cyber threat actor activity, including campaigns, TTPs, and infrastructure using frameworks such as MITRE ATT&CK.
  • Correlate technical indicators (IOCs) with behavioral and contextual information to develop comprehensive threat profiles.
  • Maintain awareness of geopolitical and sector-specific developments that may influence cyber threat activity.
  • Support limited HUMINT collection where applicable through trusted sources or partner collaboration.
  • Intelligence Analysis & Reporting
  • Analyze, evaluate, and interpret data from multiple sources to produce actionable intelligence products.
  • Draft intelligence summaries, situation reports, and risk assessments for internal and client distribution.
  • Support the cyber fusion center by integrating intelligence findings into detection and response workflows.
  • Develop and maintain intelligence requirements and contribute to collection management processes.
  • Collaboration & Cross-Functional Support
  • Work closely with the Cyber Intelligence Manager to align intelligence deliverables with client and organizational objectives.
  • Collaborate with incident response, SOC, and threat-hunting teams to ensure intelligence insights inform operations.
  • Present findings and threat briefings to both internal leadership and external stakeholders.
  • Contribute to continuous improvement of threat intelligence platforms (TIPs) and knowledge management systems.
  • Continuous Learning & Improvement
  • Track and assess emerging technologies, adversary tradecraft, and industry best practices.
  • Participate in peer review processes to maintain high analytical and reporting standards.
  • Assist in automating data collection and enrichment pipelines to improve efficiency and consistency.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service