Cyber Threat Intelligence (CTI) Analyst

Los Angeles, CA
5/22/2025
Los Angeles
145,000.00 
135,000.00 

COMPANY OVERVIEW

Join our award-winning team at Information Management Resources, Inc. (IMRI), a small business leader in the technology industry known for our commitment to innovation, excellence, and authenticity. Founded in 1992, IMRI has been at the forefront of delivering advanced cybersecurity and IT solutions, safeguarding organizations against evolving threats. We have built a reputation for our expertise in Cybersecurity, Digital Transformation, Strategic Business Consulting, and Staff Augmentation. Guided by our core values of innovation, excellence, and a solution-driven mindset, we have served a diverse portfolio of customers that includes federal agencies, state and local governments, and Fortune 1000 companies.

At IMRI, we recognize the integral part our employees play in our ongoing success. To support this, we offer a comprehensive benefits package, tailored to meet the individual needs of our employees. We are committed to promoting their overall well-being and equipping them with the necessary tools to flourish in their careers. We welcome you to be a part of our ongoing mission as we continue to navigate the digital landscape, committed to empowering organizations with our innovative solutions.

JOB DESCRIPTION - CYBER THREAT INTELLIGENCE ANALYST

Are you ready to elevate your career and make a high-profile impact in the world of cybersecurity? IMRI is seeking a dynamic and mission-driven Cyber Threat Intelligence (CTI) Analyst to take on a high-visibility role crucial to protecting critical infrastructures. This is your opportunity to be at the epicenter of threat intelligence operations, where your skills will drive actionable defense strategies to safeguard the Port and its stakeholders against evolving cyber threats.

As a CTI Analyst, you'll conduct advanced analysis of adversary tactics, techniques, and procedures (TTPs), transforming complex intelligence into clear, actionable insights. Your contributions will directly shape how cyber risks are anticipated and mitigated, positioning you as a key player in defending against today's most sophisticated threat actors. This position is a great opportunity to contribute to critical, high-stakes operations, tailor-made for a talented individual ready to rise to the next level in their cybersecurity career.


Key Responsibilities:

  • Perform technical threat analysis to identify and produce IOCs and IOAs based on real-time intelligence.
  • Leverage intelligence platforms and tools (e.g., Anomali) to monitor, analyze, and respond to security threats in support of 8x5 operations and after-hours escalation.
  • Conduct open-source intelligence (OSINT) gathering using tools like Shodan, Maltego, PassiveTotal, and VirusTotal.
  • Produce high-quality tactical, operational, and strategic intelligence reports for both internal teams and Port stakeholders.
  • Monitor, track, and become the subject matter expert (SME) on known adversaries and threat actors; escalate intelligence on active or emerging threats.
  • Apply analytic models including the Cyber Kill Chain, MITRE ATT&CK Framework, and Diamond Model to assess and report on cyber threat behavior.
  • Work cross-functionally with incident response, SOC, IT, and security operations teams to provide intelligence support.
  • Continuously improve detection logic and security controls by feeding intelligence back into detection engineering and threat hunting efforts.
  • Triage and prioritize threats, focusing on serious, credible intelligence that could impact critical operations.
  • Maintain detailed, clear documentation and contribute to evolving threat playbooks and response plans.

Qualifications:

  • 3+ years of experience as a Cyber Threat Intelligence Analyst.
  • Strong experience producing intelligence products for various levels of leadership and operational teams.
  • Familiar with threat actor behavior, TTPs, and indicators tracking.
  • Solid understanding of CTI frameworks and the full intelligence lifecycle.
  • 2+ years working with commercial CTI platforms (e.g., Anomali, Recorded Future, ThreatConnect).
  • Experience with OSINT collection tools and techniques.
  • Strong problem-solving, critical thinking, and analytical skills.
  • Ability to communicate complex information clearly to both technical and non-technical stakeholders.
  • Proven ability to work independently and collaboratively in a fast-paced, high-security environment.
  • Familiarity with maritime or critical infrastructure sectors is a plus.