Threat Intelligence Analyst

Summit 7 Systems
20h$85,000 - $115,000Remote

About The Position

Summit 7 is here to rise above the ordinary. The work we do here goes far beyond day-to-day projects - it further protects the US defense industrial base from cyber threats, fosters thought leadership and creates growth opportunities. Our support staff, sales team and technicians are all coming together to make a difference. We also recognize that you're a person with life beyond work, that's why we invest in these meaningful health and welfare benefits: Excellent health/dental benefits from BCBS and Ameritas See into the future with our luxurious VSP vision benefits Prepare for the long-haul courtesy of our 401k with company matching Unlimited mobile phone plan 10 days' vacation, 7 days sick time Bonuses and salary increase potential via our certifications plan We do cool work here, defying expectations by simply being who we are - each of us makes an impact. Essential Functions Summit 7 Systems is seeking a talented, mid-level Threat Intelligence Analyst with a strong computer science foundation to transform SOC telemetry into actionable intelligence products. This role uniquely bridges deep technical analysis with strategic communication, producing high-quality threat intelligence reports for marketing initiatives while supporting Vigilance SOC operations. The ideal candidate combines technical depth with exceptional analytical thinking and strong written communication skills. Join our team and help transform raw security data into intelligence that protects critical infrastructure while advancing the cybersecurity community's understanding of emerging threats.

Requirements

  • 3-5 years of experience in cybersecurity, threat intelligence, or SOC operations
  • 1-2 years of hands-on experience with MISP
  • Experience managing databases on Linux servers
  • Understanding of REST APIs and JSON data formats
  • Demonstrated experience producing written intelligence products
  • Background in data analysis and visualization
  • Programming: Python (required); experience with pandas, matplotlib, Jupyter notebooks
  • Query Languages: KQL, SQL, Splunk SPL
  • Data Analysis: Statistical analysis, pattern recognition, anomaly detection
  • APIs: REST API integration and JSON manipulation
  • Platforms: Microsoft Sentinel, MISP, Git, GitHub Enterprise
  • Visualization: Power BI, Sentinel Workbooks, or similar tools
  • Strong understanding of the Cyber Kill Chain and MITRE ATT&CK framework
  • Experience with structured analytic techniques
  • Ability to identify patterns in large datasets
  • Strong critical thinking and hypothesis development skills

Nice To Haves

  • Bachelor's degree in Computer Science, Cybersecurity, or related field
  • Experience in defense contractor or government environments
  • Published threat intelligence research or blog posts
  • Contributions to open-source security projects
  • Certifications such as GCTI, CySA+, GIAC, or similar
  • Security+ (DoD 8570 IAT Level I required)
  • CompTIA Linux+ or LPIC
  • Experience with machine learning for threat detection
  • Familiarity with CMMC and NIST frameworks
  • Active security clearance

Responsibilities

  • Analyze security incidents across 100+ enterprise clients to identify trends and patterns
  • Produce monthly public-facing threat landscape reports
  • Create industry-specific intelligence briefs (DIB, Construction, Education)
  • Develop technical indicators and detection signatures
  • Author threat actor profiles and campaign analyses
  • Configure and maintain OSINT and commercial threat intelligence feeds
  • Integrate MISP with Microsoft Sentinel and SOC tooling
  • Correlate alerts in Microsoft Sentinel across multiple tenants
  • Enrich indicators using Pulsedive API and custom scripts
  • Develop Python automation for data collection and analysis
  • Query MISP for historical threat patterns
  • Create data visualizations and statistical models
  • Collaborate with SOC analysts to identify noteworthy incidents
  • Translate technical findings into executive-level summaries
  • Create and maintain event templates for common threats
  • Develop automation scripts for indicator processing
  • Generate intelligence reports and statistics
  • Develop KQL queries for proactive threat hunting
  • Support incident response with intelligence context
  • Maintain and expand the threat intelligence knowledge base
  • Partner with marketing to publish intelligence reports
  • Present findings at industry conferences
  • Engage with the threat intelligence community
  • Support sales with technical expertise
  • Respond to media inquiries regarding emerging threats

Benefits

  • Excellent health/dental benefits from BCBS and Ameritas
  • See into the future with our luxurious VSP vision benefits
  • Prepare for the long-haul courtesy of our 401k with company matching
  • Unlimited mobile phone plan
  • 10 days' vacation, 7 days sick time
  • Bonuses and salary increase potential via our certifications plan
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service