Senior Threat Intelligence Analyst

Newrez LLCCoppell, TX
Onsite

About The Position

The Senior Threat Intelligence Analyst is a key individual contributor within the Cybersecurity organization, responsible for producing high-quality, actionable intelligence that enables the company to anticipate, detect, and respond to emerging threats. This role serves as a senior member of the Threat Intelligence function with mentorship responsibilities, supporting the development of junior analysts and strengthening intelligence maturity across the broader security organization. The ideal candidate brings strong analytical rigor, deep understanding of the threat landscape, technical proficiency across modern cloud and hybrid environments, and the ability to translate complex intelligence findings into meaningful insights for both technical and non-technical audiences.

Requirements

  • 5–8 years of experience in Cyber Threat Intelligence, Security Operations, Incident Response, or a related cybersecurity discipline.
  • Experience within the financial sector or other highly regulated industries.
  • Certifications such as: GCTI (GIAC Cyber Threat Intelligence) CTIA (EC-Council Certified Threat Intelligence Analyst) GCIA, GNFA, GREM, or similar advanced certifications aligned with senior threat intelligence expectations.
  • Deep familiarity with: Threat intelligence lifecycle MITRE ATT&CK framework Diamond Model of Intrusion Analysis Cyber Kill Chain STIX/TAXII standards
  • Exposure to multi-cloud environments (Azure, AWS, SaaS ecosystems) and hybrid enterprise architectures.
  • Demonstrated experience analyzing threat actor behavior, malware activity, vulnerability exploitation trends, digital risk, and fraud-related intelligence within hybrid cloud environments.
  • Strong understanding of adversary TTPs, cybercrime ecosystems, and financially motivated threat activity.
  • Effective at managing multiple priorities under tight deadlines in a fast-paced, dynamic environment.
  • Strong project management capability.
  • Self-directed and comfortable working with ambiguity and uncertainty.
  • High degree of professional maturity, integrity, ability to maintain confidential data and information.
  • High degree of business acumen; strong technical aptitude.
  • All employees are required to have smart phones that meet Company security standards with the ability to install apps such as Microsoft Authenticator. Employment will be contingent on this requirement.

Responsibilities

  • Threat Intelligence Collection, Analysis & Production Lead intelligence collection and analysis across multiple domains including: External attack surface monitoring Brand impersonation, domain spoofing, and digital risk Threat intelligence support for fraud prevention Vulnerability intelligence and exploit monitoring Malware trends, threat actor tactics, and campaign activity Dark web and deep web monitoring
  • Apply the full intelligence lifecycle (requirements, collection, analysis, dissemination, feedback) to produce timely and relevant insights.
  • Conduct structured analytic assessments using frameworks such as MITRE ATT&CK, the Diamond Model, and the Cyber Kill Chain.
  • Assess emerging threats to cloud environments, SaaS platforms, corporate endpoints, identity systems, and on-premises infrastructure.
  • Operational & Strategic Intelligence Output: Produce clear, actionable intelligence products including: Tactical alerts for SOC and Incident Response Threat actor profiles and campaign analysis Vulnerability prioritization guidance supporting VM and AppSec teams Threat hunt leads mapped to ATT&CK Weekly/bi-weekly intelligence summaries for operational teams Quarterly executive threat landscape briefings
  • Support fraud, cyber defense, and engineering teams with tailored intelligence to inform detection engineering, risk mitigation, and control improvements.
  • Cross-Functional Collaboration: Partner with SOC, Incident Response, Vulnerability Management, Application Security, Engineering, Cyber Fraud, Risk, and other business teams to operationalize intelligence.
  • Communicate complex technical findings to non-technical stakeholders in a clear, concise manner.
  • Serve as a mentor to junior analysts, guiding analytical rigor, reporting quality, and investigative methodology.
  • Help mature threat intelligence processes, workflows, and automation opportunities.
  • Technology & Tooling: Leverage enterprise threat intelligence platforms, security information and event management tools, cloud-native security capabilities, log aggregation pipelines, and attack surface monitoring platforms.
  • Maintain a vendor-agnostic mindset to ensure intelligence is grounded in outcome-driven analysis rather than tooling.
  • Ability to effectively and accurately convey information to others.
  • Performs related duties as assigned by management.

Benefits

  • Medical, dental, and vision insurance
  • Health Savings Account with employer contribution
  • 401(k) Retirement plan with employer match
  • Paid Maternity Leave/Parental Bonding Leave/Caregiver Leave
  • Adoption Assistance
  • Tuition & Certification reimbursement
  • Employee Mortgage Loan Program
  • The Newrez Employee Emergency and Disaster Fund is a program to support our team members experiencing hardships
  • Newrez NOW: Through Newrez NOW, our Corporate Social Responsibility program, you’ll have opportunities to give back, lead, and make a difference.
  • 1 company-paid Volunteer Time Off day (with over 40,000 volunteer hours contributed since our inception)
  • Matching Gifts Program - dollar-for-dollar up to $1,000
  • Access to grants, nonprofit resources, and volunteer opportunities
  • More than $6,000,000 donated since 2020
  • 1 in 5 employees participates in at least one Employee Resource Group (ERG)
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service