Drive the structuring and alignment of intelligence outputs to ensure they deliver intelligence driven operational outcomes, support threat-informed security operations, investigations, and remediation decision-making without requiring direct analyst rework.
Direct the development and implementation of operational intelligence strategies to proactively address emerging threats and support enterprise objectives.
Enable consistent production of timely intelligence products focused on relevant and active threats to support enterprise threat management operations.
Drive cross-functional collaboration, facilitating integration of threat intelligence with risk management, incident response, and security operations.
Establish and maintain stakeholder engagement models, including onboarding, stakeholder profiling, intelligence requirement intake, and feedback mechanisms, to ensure intelligence outputs are aligned to evolving enterprise and business needs.
Direct intelligence collection planning and prioritization to ensure effective coverage of priority and emerging threats while minimizing duplicative or ad hoc collection efforts.
Evaluate and recommend enhancements to intelligence tools, processes, and frameworks to optimize operational efficiency and effectiveness.
Perform threat actor and infrastructure analysis, including research and data pivoting, to identify malicious campaigns and emerging threat activity.
Lead the analysis of threats to the enterprise and the production of finished intelligence that integrates tactical and operational insights and provides direction on threat-driven prioritization.
Set clear goals and measure performance against established KPIs, using data-driven insights to inform decisions and program improvements.
Effectively communicate and report CTI program metrics and KPIs to technical leaders, senior leaders, and executives to demonstrate program effectiveness and value.
Requirements
Bachelor's degree or higher in a relevant field (e.g., Information Technology, Information Systems, Computer Science, Intelligence, Political Science, International Relations) or equivalent experience.
Minimum of 5+ years' experience in cyber threat intelligence, or a related security discipline, within a large, highly regulated organization in the public or private sector.
Demonstrated experience across the intelligence lifecycle (planning, collection, processing, analysis, dissemination).
Experience in intelligence collection management, including aligning collection activities to defined intelligence requirements and evolving threat priorities.
Demonstrated experience conducting tactical and operational cyber threat analysis, including threat actor tracking, adversary behavior analysis, and malicious infrastructure research.
Strong understanding of advanced cyber threats, threat vectors, and adversary methodologies.
Ability to apply threat intelligence frameworks and data analysis techniques to produce insights that inform detection strategy, control posture, and threat-driven prioritization.
Benefits
medical, dental and vision benefits
401(k) retirement savings plan
time off (including paid time off, company and personal holidays, volunteer time off, paid parental and caregiver leave)