×
Register Here to Apply for Jobs or Post Jobs. X

Threat Intelligence Analyst

Job in Pelham, Shelby County, Alabama, 35124, USA
Listing for: Summit7
Full Time position
Listed on 2026-02-19
Job specializations:
  • IT/Tech
    Cybersecurity, Data Analyst
Salary/Wage Range or Industry Benchmark: 85000 - 115000 USD Yearly USD 85000.00 115000.00 YEAR
Job Description & How to Apply Below

Position Title: CTI Analyst (Threat Intelligence Analyst)

Position Type: Full-Time / Exempt

Clearance: U.S. Citizenship Required;
Background Check Required (Active Clearance Preferred)

Location: Huntsville, AL / Remote

Salary: $85,000-$115,000 Department: Security Operations (MSSP)/Marketing

* Dependent upon qualifications

Summit 7 is here to rise above the ordinary. The work we do here goes far beyond day-to-day projects - it further protects the US defense industrial base from cyber threats, fosters thought leadership and creates growth opportunities. Our support staff, sales team and technicians are all coming together to make a difference. We also recognize that you’re a person with life beyond work, that’s why we invest in these meaningful health and welfare benefits:

  • Excellent health/dental benefits from BCBS and Ameritas
  • See into the future with our luxurious VSP vision benefits
  • Prepare for the long-haul courtesy of our 401k with company matching
  • Unlimited mobile phone plan
  • 10 days' vacation, 7 days sick time
  • Bonuses and salary increase potential via our certifications plan

We do cool work here, defying expectations by simply being who we are - each of us makes an impact.

Essential Functions

Summit 7 Systems is seeking a talented, mid-level Threat Intelligence Analyst with a strong computer science foundation to transform SOC telemetry into actionable intelligence products. This role uniquely bridges deep technical analysis with strategic communication, producing high-quality threat intelligence reports for marketing initiatives while supporting Vigilance SOC operations.

The ideal candidate combines technical depth with exceptional analytical thinking and strong written communication skills.

Join our team and help transform raw security data into intelligence that protects critical infrastructure while advancing the cybersecurity community’s understanding of emerging threats.

Primary Responsibilities Intelligence Production (40%)
  • Analyze security incidents across 100+ enterprise clients to identify trends and patterns
  • Produce monthly public-facing threat landscape reports
  • Create industry-specific intelligence briefs (DIB, Construction, Education)
  • Develop technical indicators and detection signatures
  • Author threat actor profiles and campaign analyses
  • Configure and maintain OSINT and commercial threat intelligence feeds
  • Integrate MISP with Microsoft Sentinel and SOC tooling
Technical Analysis (30%)
  • Correlate alerts in Microsoft Sentinel across multiple tenants
  • Enrich indicators using Pulsedive API and custom scripts
  • Develop Python automation for data collection and analysis
  • Query MISP for historical threat patterns
  • Create data visualizations and statistical models
SOC Integration (20%)
  • Collaborate with SOC analysts to identify noteworthy incidents
  • Translate technical findings into executive-level summaries
  • Create and maintain event templates for common threats
  • Develop automation scripts for indicator processing
  • Generate intelligence reports and statistics
  • Develop KQL queries for proactive threat hunting
  • Support incident response with intelligence context
  • Maintain and expand the threat intelligence knowledge base
External Communication (10%)
  • Partner with marketing to publish intelligence reports
  • Present findings at industry conferences
  • Engage with the threat intelligence community
  • Support sales with technical expertise
  • Respond to media inquiries regarding emerging threats
Job Specifications

Required Qualifications / Experience
  • 3-5 years of experience in cybersecurity, threat intelligence, or SOC operations
  • 1-2 years of hands‑on experience with MISP
  • Experience managing databases on Linux servers
  • Understanding of REST APIs and JSON data formats
  • Demonstrated experience producing written intelligence products
  • Background in data analysis and visualization
Technical Skills
  • Programming:
    Python (required); experience with pandas, matplotlib, Jupyter notebooks
  • Query

    Languages:

    KQL, SQL, Splunk SPL
  • Data Analysis:
    Statistical analysis, pattern recognition, anomaly detection
  • APIs: REST API integration and JSON manipulation
  • Platforms:
    Microsoft Sentinel, MISP, Git, Git Hub Enterprise
  • Visualization:
    Power BI, Sentinel Workbooks, or similar tools
Analytical…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary