There are still lots of open positions. Let's find the one that's right for you.
CTG is seeking to fill a Cyber Threat Intelligence Analyst opening for our client in San Jose, CA. This position involves conducting open-source intelligence (OSINT) collection and analysis, producing intelligence products at tactical, operational, and strategic levels, and gathering and synthesizing information from multiple threat intelligence types, sources, and collection methods. The analyst will utilize open-source tools such as Shodan, Maltego, PassiveTotal, and VirusTotal in day-to-day activities, and apply Cyber Threat Intelligence (CTI) tools like Anomali to support intelligence collection and analysis. The role requires following and applying intelligence lifecycle best practices and analytic frameworks, including the Cyber Kill Chain, Diamond Model, and MITRE ATT&CK. Collaboration with team members and other stakeholders to provide actionable intelligence insights is essential, as is the ability to communicate complex findings clearly and effectively to a variety of audiences.