Key Responsibilities and Required Skills for Cyber Intelligence Analyst
💰 $80,000 - $150,000
🎯 Role Definition
A Cyber Intelligence Analyst collects, analyzes, and disseminates actionable cyber threat intelligence to reduce organizational risk, prioritize defensive actions, and support incident response and executive decision-making. This role blends technical analysis (malware analysis, network traffic review, IOC development), open-source and human intelligence collection (OSINT/HUMINT), threat actor profiling, and contextual reporting mapped to frameworks such as MITRE ATT&CK. The Cyber Intelligence Analyst drives proactive detection, advises on mitigation strategies, and ensures intelligence is operationalized across security operations, incident response, risk, and executive stakeholders.
📈 Career Progression
Typical Career Path
Entry Point From:
- SOC Analyst (Tier 1 / Tier 2) with familiarity in alerts, triage, and SIEM use.
- Incident Response Analyst or Digital Forensics Technician who has experience investigating compromises.
- Intelligence Analyst Intern / OSINT Researcher with hands-on experience gathering and validating open-source data.
Advancement To:
- Senior Cyber Intelligence Analyst (lead analyst role focusing on strategic intelligence products).
- Threat Intelligence Lead or Threat Intelligence Manager (team leadership and program ownership).
- Threat Hunting Lead, Director of Threat Intelligence, or Head of Threat Operations.
- Strategic Risk or CISO-track roles where intelligence informs enterprise security strategy.
Lateral Moves:
- Threat Hunter (proactive adversary discovery across telemetry).
- Incident Responder / Forensics Lead (hands-on remediation and root cause analysis).
- SOC Manager or Detection Engineering (build detection content and tune telemetry).
- Cyber Risk Analyst or Vulnerability Management Analyst (translate intelligence into remediation priorities).
Core Responsibilities
Primary Functions
- Collect, aggregate, and normalize threat data from diverse sources (internal telemetry, SIEM, EDR, TIPs, OSINT feeds, commercial intelligence, and partner sharing communities) to create a single curated intelligence picture that drives detection and response.
- Produce timely tactical intelligence products (IOCs, YARA rules, Sigma rules, STIX/TAXII packages) that are immediately operationalized by SOC and detection engineering teams to block or detect adversary activity.
- Perform malware triage and static/dynamic analysis to identify malware capabilities, persistence mechanisms, C2 protocols, and indicators of compromise, and translate findings into remediation and detection guidance for infrastructure owners.
- Map observed adversary behavior, tools, and techniques to MITRE ATT&CK and other frameworks, producing clear TTP-based assessments that inform prioritized defensive actions and detection coverage gaps.
- Lead incident intelligence support during security incidents by providing attribution analysis, campaign correlation, artifact enrichment, and recommendations for containment, eradication, and recovery actions.
- Conduct proactive threat hunting campaigns using hypotheses derived from intelligence, telemetry analysis (network, endpoint, application logs), and adversary behaviors to uncover hidden compromises and reduce dwell time.
- Maintain and enrich the organization’s threat intelligence platform (MISP, Anomali, Recorded Future, ThreatConnect or equivalent), ensuring accurate tagging, confidence scoring, and lifecycle management of IOCs and threat actors.
- Develop and maintain automated enrichment pipelines (e.g., scripts, playbooks, STIX/TAXII integrations) that enhance observables with contextual data (geolocation, ASN, actor profiles, previous sightings), improving analyst triage speed and accuracy.
- Monitor dark web, underground forums, paste sites, code repositories, and social media for targeted threats, data leaks, or emerging tooling relevant to the enterprise and deliver prioritized intelligence briefs.
- Conduct strategic analysis that synthesizes long-term threat trends, geopolitical drivers, and sector-specific risks to inform executive briefings, tabletop exercises, and enterprise risk decisions.
- Build and maintain relationships with external intelligence sharing communities (ISACs/ISAOs, government CERTs, vendor partners) to exchange indicators, coordinated responses, and best practices.
- Validate and tune detection content by correlating intelligence findings with historical telemetry and confirmed incidents, providing measurable improvements to detection fidelity and reducing false positives.
- Create and deliver clear written intelligence deliverables and oral briefings for technical teams, business stakeholders, and executives—tailoring the level of detail to audience needs and decision timelines.
- Translate adversary playbooks into concrete mitigation and control recommendations (network segmentation, EDR policies, threat hunting signatures, blocking lists) and work with owners to implement them.
- Lead threat modeling and risk assessments for critical applications and assets by integrating external threat intelligence with internal architecture, exposure, and vulnerability data.
- Maintain awareness of legal, privacy, and policy constraints when collecting and disseminating intelligence, ensuring all activity complies with applicable laws and organizational guidelines.
- Curate and maintain an internal knowledge base of adversary profiles, campaign timelines, and investigative playbooks to accelerate future investigations and onboarding of new analysts.
- Support vulnerability management by prioritizing patches and compensating controls based on active exploitation, public exploit availability, and targetability of the organization.
- Conduct attribution and campaign clustering by linking multiple incidents across time and telemetry to identify persistent adversaries, supply chain threats, or coordinated campaigns.
- Mentor junior analysts in investigative techniques, intelligence lifecycle management, and use of tools (SIEM, EDR, malware sandboxes, TIPs), building team capability and analytical rigor.
- Define and track intelligence program metrics (mean time to deliver intelligence, IOC time-to-enrichment, detection coverage improvements) to demonstrate operational impact and guide resourcing.
- Perform scheduled and ad-hoc open-source and commercial research to evaluate new threat actor groups, malware families, or exploitation trends, and translate findings into detection or policy change proposals.
- Coordinate cross-functional intelligence-driven exercises and tabletop scenarios with incident response, legal, communications, and business continuity to validate organizational readiness and playbooks.
- Maintain readiness for 24/7 escalation as part of on-call rotations, providing high-confidence intelligence support during major incidents and cross-organizational crisis responses.
Secondary Functions
- Support ad-hoc intelligence requests from internal teams (legal, HR, physical security, executive protection) and external partners, delivering tailored reporting and recommended actions.
- Contribute to the organization’s intelligence strategy, roadmap, and tooling selection (TIPs, analytical platforms, automation frameworks) to scale program effectiveness.
- Collaborate with detection engineering to translate intelligence into durable detection rules (Sigma, YARA, Snort) and automated response playbooks for SOAR integration.
- Participate in sprint planning and agile ceremonies when intelligence products are delivered as part of engineering or security ops teams.
- Provide subject matter expertise to procurement, legal, and third-party risk teams when evaluating supplier compromises, vendor security posture, or supply chain threats.
- Develop training materials and run workshops for SOC analysts, incident responders, and engineering teams on latest adversary techniques, IOC interpretation, and intelligence-driven investigations.
- Maintain and refine playbooks, runbooks, and case templates for common investigations to reduce time-to-resolution and ensure consistent analysis quality.
- Assist in the evaluation and proof-of-concept testing of new intelligence vendors, data sources, and analytic tools to augment internal capabilities.
- Create executive-ready dashboards and periodic reports summarizing threat posture, active campaigns, and strategic recommendations for senior leadership.
- Support legal and compliance teams with intelligence artifacts needed for regulatory reporting, law enforcement coordination, or insurance claims.
Required Skills & Competencies
Hard Skills (Technical)
- Threat intelligence collection & analysis (OSINT, HUMINT, SIGINT sources) and operationalization across SOC and incident response.
- Proficiency with Threat Intelligence Platforms (TIPs) and formats like MISP, ThreatConnect, Recorded Future, STIX/TAXII, and TAXII server integrations.
- Strong experience with SIEM platforms (Splunk, IBM QRadar, Elastic/Security, Azure Sentinel) to query telemetry, create searches, and validate detections.
- Malware analysis capabilities including static and dynamic analysis using tools such as Ghidra, IDA Pro, Cuckoo sandbox, or VirusTotal; ability to extract IOCs and behavioral indicators.
- Experience writing detection and hunting queries (Sigma rules, YARA, Elastic DSL, KQL, Splunk SPL) and converting intelligence into operational detections.
- Familiarity with network forensics and packet analysis (Wireshark, Zeek/Bro), and an understanding of TCP/IP, DNS, HTTP, and common C2 protocols.
- Scripting and automation skills (Python, PowerShell, Bash) to build enrichment pipelines, parsers, and small-scale automation for repeatable intelligence workflows.
- Knowledge of MITRE ATT&CK framework, adversary TTP mapping, and experience using ATT&CK for assessments and detection coverage reporting.
- Reverse engineering fundamentals and ability to reason about compiled code behavior, obfuscation techniques, and persistence strategies.
- Experience with IOC lifecycle management, enrichment, and dissemination to security controls (firewalls, EDR, network devices) and playbook integration with SOAR.
- Familiarity with cloud security telemetry (AWS CloudTrail, AWS VPC Flow Logs, Azure Monitor, GCP logs) and cloud-specific threat patterns.
- Understanding of vulnerability management prioritization using intel data (exploit availability, active campaigns) and CVE mapping.
- Experience with threat hunting methodologies and hypothesis-driven investigative techniques across multiple telemetry sources.
Soft Skills
- Exceptional analytical reasoning and synthesis—able to turn noisy telemetry into clear, prioritized intelligence and actionable recommendations.
- Strong written and verbal communication skills for producing concise intelligence reports, executive briefings, and technical documentation.
- Stakeholder management and collaboration across security operations, incident response, legal, risk, and business units.
- Curiosity and continuous learning mindset to keep pace with adversary innovation, emerging threats, and new tooling.
- Attention to detail and investigative rigor to validate sources, avoid false positives, and maintain intelligence quality.
- Ability to prioritize under pressure and manage multiple concurrent investigations or requests during incidents.
- Teaching and mentorship skills to upskill junior analysts and promote best practices across teams.
- Ethical judgment and respect for confidentiality, privacy, and legal boundaries while collecting and sharing intelligence.
- Problem solving and creativity when developing detection strategies or working around data gaps.
- Project management skills to drive intelligence projects from requirements through delivery and measure outcomes.
Education & Experience
Educational Background
Minimum Education:
- Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, Intelligence Studies, Criminal Justice, or a related technical or analytical field.
- Equivalent practical experience (SOC/IR/CTI roles) may substitute for formal degree.
Preferred Education:
- Master’s degree in Cybersecurity, Information Assurance, Intelligence Analysis, Data Science, or a related discipline.
- Professional certifications such as GCTI (GIAC Cyber Threat Intelligence), CISSP, GCIA, GREM, OSCP, or SANS coursework related to malware analysis and threat intelligence.
Relevant Fields of Study:
- Cybersecurity / Information Security
- Computer Science or Engineering
- Intelligence Studies / International Relations
- Data Science / Applied Analytics
- Criminal Justice / Forensic Science
Experience Requirements
Typical Experience Range: 3–7+ years in cybersecurity roles with at least 2 years focused on threat intelligence, incident response, malware analysis, or SOC operations.
Preferred:
- 5+ years of direct threat intelligence experience across tactical, operational, and strategic intelligence lifecycles.
- Demonstrated experience producing intelligence products that were operationalized by SOC, detection engineering, and incident response teams.
- Prior experience collaborating with external sharing communities (ISACs/ISAOs), government agencies, or multi-organization threat intelligence programs.