JOB DESCRIPTION - CYBER THREAT INTELLIGENCE ANALYST
Are you ready to elevate your career and make a high-profile impact in the world of cybersecurity? IMRI is seeking a dynamic and mission-driven Cyber Threat Intelligence (CTI) Analyst to take on a high-visibility role crucial to protecting critical infrastructures. This is your opportunity to be at the epicenter of threat intelligence operations, where your skills will drive actionable defense strategies to safeguard the Port and its stakeholders against evolving cyber threats.
As a CTI Analyst, you'll conduct advanced analysis of adversary tactics, techniques, and procedures (TTPs), transforming complex intelligence into clear, actionable insights. Your contributions will directly shape how cyber risks are anticipated and mitigated, positioning you as a key player in defending against today's most sophisticated threat actors. This position is a great opportunity to contribute to critical, high-stakes operations, tailor-made for a talented individual ready to rise to the next level in their cybersecurity career.
Key Responsibilities:
- Perform technical threat analysis to identify and produce IOCs and IOAs based on real-time intelligence.
- Leverage intelligence platforms and tools (e.g., Anomali) to monitor, analyze, and respond to security threats in support of 8x5 operations and after-hours escalation.
- Conduct open-source intelligence (OSINT) gathering using tools like Shodan, Maltego, PassiveTotal, and VirusTotal.
- Produce high-quality tactical, operational, and strategic intelligence reports for both internal teams and Port stakeholders.
- Monitor, track, and become the subject matter expert (SME) on known adversaries and threat actors; escalate intelligence on active or emerging threats.
- Apply analytic models including the Cyber Kill Chain, MITRE ATT&CK Framework, and Diamond Model to assess and report on cyber threat behavior.
- Work cross-functionally with incident response, SOC, IT, and security operations teams to provide intelligence support.
- Continuously improve detection logic and security controls by feeding intelligence back into detection engineering and threat hunting efforts.
- Triage and prioritize threats, focusing on serious, credible intelligence that could impact critical operations.
- Maintain detailed, clear documentation and contribute to evolving threat playbooks and response plans.
Qualifications:
- 3+ years of experience as a Cyber Threat Intelligence Analyst.
- Strong experience producing intelligence products for various levels of leadership and operational teams.
- Familiar with threat actor behavior, TTPs, and indicators tracking.
- Solid understanding of CTI frameworks and the full intelligence lifecycle.
- 2+ years working with commercial CTI platforms (e.g., Anomali, Recorded Future, ThreatConnect).
- Experience with OSINT collection tools and techniques.
- Strong problem-solving, critical thinking, and analytical skills.
- Ability to communicate complex information clearly to both technical and non-technical stakeholders.
- Proven ability to work independently and collaboratively in a fast-paced, high-security environment.
- Familiarity with maritime or critical infrastructure sectors is a plus.