About The Position

As a Sr Cyber Threat Intelligence Analyst on Target’s Cyber Threat Intelligence (CTI) team, you will support the identification, collection, analysis, production, and dissemination of intelligence on cyber threat activity that may pose a risk to Target. This role contributes to strategic, operational, and tactical intelligence objectives by converting threat reporting, technical indicators, behavioral observations, and internal security context into insights that inform detection, response, and risk prioritization. You will work closely with fellow CTI analysts and cross-functional security partners to understand and communicate cyber threat activity relevant to Target. A successful candidate will demonstrate analytic rigor, technical curiosity, sound judgment, and the ability to operate independently while collaborating across teams to strengthen analytic tradecraft and advance CTI capabilities. Use your skills, experience, and talents to be a part of groundbreaking thinking and visionary goals.

Requirements

  • 4-year degree in Cyber Security, Intelligence Studies, Security Studies, International Relations, Political Science, Computer Science or equivalent industry experience
  • 3+ years of experience in information security, preferably in cyber threat intelligence, security operations, incident response, threat hunting, malware analysis, or another investigative cyber role, with understanding of malware analysis fundamentals, indicator development, infrastructure analysis, and detection or response support
  • Experience tracking cybercriminal, nation-state, high-grade, or other cyber threat actors using internal and external data sources, with knowledge of current threat techniques, vulnerability disclosures, data breach incidents, malware trends, social engineering methods, and security analysis techniques
  • Extensive experience producing intelligence products and briefings for incident response, detection engineering, security operations, leadership, or business stakeholders, with strong verbal, written, and presentation skills and the ability to translate complex technical concepts into clear and business-relevant language
  • Demonstrated ability to collect, analyze, synthesize, and interpret qualitative and quantitative data from multiple sources; develop threat expertise; identify complex actor behavior patterns; and produce actionable judgments with appropriate analytic confidence
  • Experience applying analytic frameworks and methodologies such as the intelligence cycle, Diamond Model, Cyber Kill Chain, MITRE ATT&CK, and structured analytic techniques
  • Experience using digital investigation and intelligence tools such as VirusTotal, VMRay, DomainTools, URLScan, Maltego, Analyst Notebook, or comparable platforms along with strong online research skills across technical, open-source, social media, forum, and traditional sources
  • Exceptional problem-solving skills, intellectual curiosity, attention to detail, and ability to operate effectively in a fast-paced environment that includes supporting time-sensitive security investigations
  • Excellent communication skills with the ability to speak to both business and technical teams as well as translate ideas between them
  • Self-driven and results oriented; able to meet tight timelines
  • Motivated, team player with ability to collaborate effectively across global team

Responsibilities

  • Serve as an all-source cyber threat intelligence analyst supporting operational and tactical CTI priorities through the collection, evaluation, cataloging, and analysis of threat information from internal telemetry, external reporting, open-source research, vendor sources, peer communities, and security investigations.
  • Analyze indicators of compromise, threat actor TTPs, intrusion patterns, malware behaviors, infrastructure, vulnerabilities, and campaign activity to generate actionable intelligence for Target.
  • Develop and maintain subject-matter expertise on cybercriminal groups, emerging threats, technology platforms, and threat vectors relevant to Target’s operating environment.
  • Partner with CSIRT, Reverse Engineering, Threat Management, Vulnerability Management, and other security teams to contextualize threats, support investigations, and refine detection and response efforts.
  • Draft, edit, and deliver finished intelligence products and briefings, including threat assessments, actor profiles, incident support reporting, and recurring intelligence updates.
  • Apply structured analytic techniques and frameworks such as the intelligence cycle, Diamond Model, Cyber Kill Chain, MITRE ATT&CK, and threat hunting methodologies to identify patterns, support judgments, and communicate analytic confidence.
  • Identify opportunities to improve CTI processes, tools, collection requirements, analytic workflows, and dissemination methods; partner with Threat Intelligence Engineering and cross-functional teams to automate and streamline workflows.
  • Coordinate with trusted external peer groups, industry communities, and information-sharing partners to exchange intelligence, maintain awareness of the broader cyber threat landscape, and influence outcomes that advance CTI priorities.

Benefits

  • medical
  • vision
  • dental
  • life insurance
  • 401(k)
  • employee discount
  • short term disability
  • long term disability
  • paid sick leave
  • paid national holidays
  • paid vacation
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service