Senior Cyber Threat Intelligence Analyst
Listed on 2026-01-02
-
IT/Tech
Cybersecurity, Information Security
American International Group, Inc. (AIG) is a leading global insurance organization. AIG member companies provide a wide range of property casualty insurance in approximately 70 countries and jurisdictions. These diverse offerings include products and services that help businesses and individuals protect their assets and manage risks.
We’re also committed to making a positive difference for our colleagues and in the communities where we work and live. We encourage colleagues to give back to the causes they care most about, supporting these efforts through our Volunteer Time Off and Matching Grants Programs.
Make your mark in Information TechnologyAt AIG, technology is at the heart of everything we do, from underwriting risks to processing claims. The Information Technology team equips our colleagues with the latest tools to complete their work efficiently and with the highest standards of excellence. The team is responsible for shielding the company’s systems from security risks, while designing technology strategies that enable AIG’s businesses to achieve their goals.
AIG’s Information Technology functions include enterprise architecture, software and systems engineering, cybersecurity, and technology risk and compliance.
The Cyber Threat Intelligence (CTI) team consists of analysts who specialize in collecting, analyzing, and operationalizing intelligence on cyber adversaries. The analyst will work within an interdisciplinary team that develops advanced analytical frameworks, tools and research methodologies, and other approaches to identify emerging cyber threats. The analyst will be responsible for analyzing the technical and behavioral aspects of malicious cyber activity and will serve as a subject matter expert on cyber threat actors, campaigns, TTPs, and geopolitical drivers influencing cyber risk.
Additionally, the analyst will respond to stakeholder-directed research requests and contribute to internal intelligence products. This position plays a critical function in producing a comprehensive operating picture and cybersecurity situational awareness.
Collect, process, catalog, and document information using sources and tools available
Conduct deep-dive investigations into threat actors, TTPs, malware, phishing campaigns, and IOCs using OSINT, dark web, commercial feeds, and internal telemetry
Develop independently and support production of recurring intelligence reporting and briefings for various stakeholders within the organization
Produce concise written analysis and visual presentation of findings under deadlines, including both tactical and strategic assessments
Respond to requests for ad-hoc reporting and research topics from management as required
Maintain a knowledge base of threats to the organization’s business lines, regions, and technology stack
Work with various intelligence collection and reporting tools and frameworks to produce reports
Quickly understand and deliver on stakeholder requirements to produce intelligence that is relevant, timely, accurate, actionable, and appropriate audience
Mentor junior analysts to strengthen analytic tradecraft standards across the team and champion a culture of curiosity, critical thinking, and adversary awareness
Deal professionally with offensive, profane, and obscene materials encountered during the course of investigations and research
Bachelor’s degree in cybersecurity, computer science, intelligence studies, or related discipline
7+ years of experience in cybersecurity, with at least 5+ years focused on cyber threat intelligence
Experience with using intelligence analysis methodologies and the threat intelligence lifecycle to distill raw information into actionable intelligence
Good understanding of global geopolitical dynamics and the ability to apply that knowledge to an information security context
Proven ability to understand and explain the behaviors of different types of sophisticated cyber adversaries including organized cybercriminal groups and state-sponsored groups
Strong knowledge of common threat actor tools, infrastructure, and malware families
Proven…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).