×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Threat Intelligence Analyst; HYBRID

Job in Charlotte, Mecklenburg County, North Carolina, 28245, USA
Listing for: Equitable
Full Time, Part Time position
Listed on 2026-01-30
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Analyst, Data Security, Security Manager
Salary/Wage Range or Industry Benchmark: 100000 - 112000 USD Yearly USD 100000.00 112000.00 YEAR
Job Description & How to Apply Below
Position: Cyber Threat Intelligence Analyst (HYBRID)

About The Role

At Equitable, we help clients secure their financial well-being so they can pursue long and fulfilling lives - a mission we’ve honed since 1859.

Equitable is looking for a Cyber Threat Intelligence Analyst, you will serve as the critical link between our external threat intelligence provider and internal cybersecurity teams. Embedded within the Security Operations Center (SOC), this role is responsible for curating, analyzing, and disseminating actionable threat intelligence to stakeholders, SOC analysts, and penetration testing teams. You will also act as a top technical escalation point during cyber incidents and contribute to threat hunting and incident response activities.

This position requires deep expertise in SOC technologies, threat hunting methodologies, and escalation management. The ideal candidate will have strong analytical skills, the ability to translate intelligence into operational actions, and experience collaborating across technical and business teams in high-pressure environments.

What You’ll Be Doing
  • Threat Intelligence Management
    • Act as the primary liaison between the organization and external threat intelligence providers.
    • Curate, validate, and prioritize threat intelligence feeds for relevance and impact.
    • Disseminate actionable intelligence to SOC, penetration testing teams, and other stakeholders.
  • SOC Integration & Threat Hunting
    • Leverage SOC tools and technologies to operationalize threat intelligence.
    • Conduct proactive threat hunting based on intelligence indicators and emerging trends.
    • Support SOC analysts with advanced technical guidance and escalation management.
  • Incident Response Participation
    • Serve as a member of the technical incident response team during cyber events.
    • Act as a top technical escalation point for SOC analysts during major incidents.
    • Assist in forensic analysis and root cause investigations when required.
  • Collaboration & Reporting
    • Work closely with penetration testing teams to align intelligence with offensive security strategies.
    • Prepare intelligence reports and briefings for leadership and technical teams.
    • Maintain documentation of intelligence processes and lessons learned.
  • Threat Detection & Monitoring
    • Perform threat detection and monitor the threat landscape as it relates to the firm.

This position offers a hybrid work schedule, with an on–site presence of 2–3 days per week combining flexibility with team collaboration.

The base salary range for this position is $100,000 - $112,000. Actual base salaries vary based on skills, experience, and geographical location. In addition to base pay, Equitable provides compensation to reward performance with base salary increases, spot bonuses, and short-term incentive compensation opportunities. Eligibility for these programs depends on level and functional area of responsibility.

For eligible employees, Equitable provides a full range of benefits. This includes medical, dental, vision, a 401(k) plan, and paid time off. For detailed descriptions of these benefits, please reference the link below.

Equitable

Pay and Benefits:

Equitable Total Rewards Program

What You Will Bring

Required Qualifications:

  • Bachelor’s degree in Cybersecurity, Information Technology, or related field OR 5+ years of relevant experience
  • 3+ years of experience in threat intelligence, SOC operations, or incident response.
  • Established understanding of threat actor tactics, techniques, and procedures (TTPs).
  • Hands-on experience with SIEM, EDR, and threat intelligence platforms.
  • Demonstrated communication and analytical skills.

Preferred Qualifications:

  • Experience in financial services or other regulated industries.
  • Certifications such as GCTI, GCIH, or CISSP.
  • Familiarity with MITRE ATT&CK framework and threat modeling.
  • Scripting skills for automation (Python, Power Shell).
Skills

Agile Methodologies: Knowledge of concept and principles of agile methodology; ability to apply appropriate agile approaches in the processes of software development and delivery.

Confidentiality: Knowledge of practices and policies governing disclosure of information about the organization, its business activities, and employees; ability to apply this knowledge appropriately to…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary