×
Register Here to Apply for Jobs or Post Jobs. X

Sr Threat Intelligence Analyst - Erlanger, KY

Job in Erlanger, Kenton County, Kentucky, 41018, USA
Listing for: ADM
Full Time position
Listed on 2025-12-08
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant, Data Security
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

Overview

Sr Threat Intelligence Analyst
- Erlanger, KY

SCTIAs, under general supervision, provides support to leaders and cyber security analysts by consuming, analyzing, and reporting tactical, operational, and strategic threat intelligence. The SCTIAs focus their efforts on processing indicators of compromise from known attacks, emerging cyber threats, current events and their potential cyber impacts, threat actors, threat actor tools and techniques, motivations of threat actors, and malware, etc. The SCTIA will need to use intelligence processes and tools to work all of this threat information to develop intelligence products that are useful to leadership and cyber security analysts in the security operations center, incident responders, hunt teams, vulnerability management, etc.

The SCTIA will need to build and maintain a deep understanding of ADM’s business operations and environment in order to determine the relevance of the threat information, and well as the vectors adversaries may use to attack ADM. The SCTIA will provide direct support and assist in investigations conducted by cyber incident responders, physical security, security operations center, hunt teams, insider threat, legal, etc.

Responsibilities
  • Demonstrate and apply subject matter expertise in a variety of information security disciplines, both technical and non-technical
  • Responsible for the collection, processing, analysis, and production of tactical, operational, and strategic intelligence throughout the organization
  • Prioritize work, collate information from various sources, and move swiftly toward strong analytical conclusions
  • Help develop and maintain CTI processes, procedures, playbooks, etc.
  • Develop, maintain, and execute the threat communication / product distribution processes
  • Author professional looking reports that can be clearly understood by technical, non-technical, and executive consumers based on the audience
  • Accept and incorporate intelligence product feedback from consumers and stakeholders
  • Accept editorial input from the CTI Manager and higher
  • Readiness to defend analysis in the face of opposing opinions
  • Employ predictive analytic methods to determine changes in adversary’s capabilities, motivations, and intent, while providing recommendations to reduce risk before exposure to threats occur
  • Use intelligence tools to hunt large sets of data to find threat activity and analyze it
  • Provide direct analytic support to the security operations teams providing context to active risks and threats using intelligence
  • Work individually, with a team, and in a hybrid managing services environment utilizing various partners in dynamic ways
  • Help prioritize and lead cases, investigations, daily work tasks, and projects with management guidance
  • Mentor junior analysts
Requirements
  • 7+ years’ experience in an intelligence role with 3+ years in cyber threat intelligence role
  • Bachelor’s Degree in computer science, engineering, computer information systems, or 5+ years of experience in an information security-related field
  • Security certifications such as CISSP or SANS preferred
  • Strong verbal and written communication and presentation skills
  • In-depth knowledge of IT
  • Expertise in understanding and applying the intelligence lifecycle
  • Intelligence analysis tradecraft skills
  • Strong experience in vulnerability, exploitation, penetration testing concepts
  • Strong experience with information security, host- and network-based forensics, monitoring, detection, and incident response best practices
  • Strong experience in computer intrusions, malicious code, and technical aspects of associated threat vectors, adversarial TTPs, and their relation to the cyber kill chain
  • In-depth knowledge of the general cyber threat landscape coupled with the ability to quickly determine how threats can or will affect an organization, based on factors such as confidence, likelihood, impact, and probability.
  • Understanding the MITRE attack framework.
  • Working knowledge of intelligence analysis applications, tools, and systems and the ability to use them on datasets to analyze threats
Desired Skills and Experience
  • Five or more years of direct experience actively managing/using threat intelligence…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary