Cyber Threat Intelligence Analyst; HYBRID
Listed on 2026-01-30
-
IT/Tech
Cybersecurity, Systems Analyst, Data Security, Security Manager
About The Role
At Equitable, we help clients secure their financial well-being so they can pursue long and fulfilling lives - a mission we’ve honed since 1859.
Equitable is looking for a Cyber Threat Intelligence Analyst, you will serve as the critical link between our external threat intelligence provider and internal cybersecurity teams. Embedded within the Security Operations Center (SOC), this role is responsible for curating, analyzing, and disseminating actionable threat intelligence to stakeholders, SOC analysts, and penetration testing teams. You will also act as a top technical escalation point during cyber incidents and contribute to threat hunting and incident response activities.
This position requires deep expertise in SOC technologies, threat hunting methodologies, and escalation management. The ideal candidate will have strong analytical skills, the ability to translate intelligence into operational actions, and experience collaborating across technical and business teams in high-pressure environments.
What You’ll Be Doing- Threat Intelligence Management
- Act as the primary liaison between the organization and external threat intelligence providers.
- Curate, validate, and prioritize threat intelligence feeds for relevance and impact.
- Disseminate actionable intelligence to SOC, penetration testing teams, and other stakeholders.
- SOC Integration & Threat Hunting
- Leverage SOC tools and technologies to operationalize threat intelligence.
- Conduct proactive threat hunting based on intelligence indicators and emerging trends.
- Support SOC analysts with advanced technical guidance and escalation management.
- Incident Response Participation
- Serve as a member of the technical incident response team during cyber events.
- Act as a top technical escalation point for SOC analysts during major incidents.
- Assist in forensic analysis and root cause investigations when required.
- Collaboration & Reporting
- Work closely with penetration testing teams to align intelligence with offensive security strategies.
- Prepare intelligence reports and briefings for leadership and technical teams.
- Maintain documentation of intelligence processes and lessons learned.
- Threat Detection & Monitoring
- Perform threat detection and monitor the threat landscape as it relates to the firm.
This position offers a hybrid work schedule, with an on–site presence of 2–3 days per week combining flexibility with team collaboration.
The base salary range for this position is $100,000 - $112,000. Actual base salaries vary based on skills, experience, and geographical location. In addition to base pay, Equitable provides compensation to reward performance with base salary increases, spot bonuses, and short-term incentive compensation opportunities. Eligibility for these programs depends on level and functional area of responsibility.
For eligible employees, Equitable provides a full range of benefits. This includes medical, dental, vision, a 401(k) plan, and paid time off. For detailed descriptions of these benefits, please reference the link below.
Equitable
Pay and Benefits:
Equitable Total Rewards Program
Required Qualifications:
- Bachelor’s degree in Cybersecurity, Information Technology, or related field OR 5+ years of relevant experience
- 3+ years of experience in threat intelligence, SOC operations, or incident response.
- Established understanding of threat actor tactics, techniques, and procedures (TTPs).
- Hands-on experience with SIEM, EDR, and threat intelligence platforms.
- Demonstrated communication and analytical skills.
Preferred Qualifications:
- Experience in financial services or other regulated industries.
- Certifications such as GCTI, GCIH, or CISSP.
- Familiarity with MITRE ATT&CK framework and threat modeling.
- Scripting skills for automation (Python, Power Shell).
Agile Methodologies: Knowledge of concept and principles of agile methodology; ability to apply appropriate agile approaches in the processes of software development and delivery.
Confidentiality: Knowledge of practices and policies governing disclosure of information about the organization, its business activities, and employees; ability to apply this knowledge appropriately to…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).