1) Role Summary
The Threat Intelligence Analyst identifies, analyzes, and operationalizes information about adversaries, campaigns, vulnerabilities, and attack techniques to reduce organizational cyber risk. The role translates external and internal intelligence into actionable detections, mitigations, and decision support for security operations, incident response, vulnerability management, and product engineering.
This role exists in software and IT organizations because threat actors continuously target SaaS platforms, cloud infrastructure, CI/CD pipelines, identity systems, and customer-facing applications. Without a dedicated intelligence capability, security teams can become reactiveโresponding to incidents after impact rather than anticipating and preventing them.
Business value is created through improved detection coverage, faster incident triage, prioritized remediation based on real-world exploitation, and executive-ready risk insights that inform security investments. This is a Current role with established practices, frameworks, and tooling across mature security programs.
Typical interactions include: – Security Operations Center (SOC) and Detection Engineering – Incident Response (IR) / Digital Forensics (DFIR) – Vulnerability Management and Patch Governance – Security Engineering / Platform Security / Cloud Security – Product Security / Application Security – IT Operations and Identity & Access Management (IAM) – GRC (Governance, Risk, and Compliance) – Legal/Privacy (context-specific, usually during investigations and reporting) – Vendor management / Procurement (for threat intel providers and tooling)
Seniority assumption (conservative): Mid-level Individual Contributor (IC) โThreat Intelligence Analystโ (not junior, not senior/lead). Expected to operate independently on core workflows, with guidance on strategy and prioritization.
Reporting line (typical): Reports to a SOC Manager, Threat Intelligence Lead, or Head of Security Operations, depending on organization size and maturity.
2) Role Mission
Core mission:
Provide timely, accurate, and actionable threat intelligence that measurably improves the organizationโs prevention, detection, response, and remediation capabilitiesโaligned to business-critical assets, products, and services.
Strategic importance to the company: – Enables proactive security posture by anticipating adversary behavior targeting SaaS/cloud environments. – Reduces incident impact through earlier detection and better-informed triage. – Improves vulnerability prioritization by focusing remediation on exploited-in-the-wild and high-likelihood threats. – Strengthens customer trust by supporting secure operations and credible security communications.
Primary business outcomes expected: – Higher-quality detections mapped to current adversary TTPs (techniques, tactics, procedures) – Reduced time-to-triage and time-to-containment for relevant threats – Improved vulnerability remediation prioritization and reduced exposure windows – More informed security leadership decisions through clear, evidence-based intelligence – Reduced noise and better signal in SOC workflows through intel-enriched alerts
3) Core Responsibilities
Strategic responsibilities
- Define and maintain intelligence requirements (PIRs/SIRs): Establish Priority Intelligence Requirements aligned to business objectives (e.g., customer data protection, SaaS uptime, cloud control plane integrity).
- Threat landscape monitoring and reporting: Track relevant threat actors, sectors, campaigns, and techniques targeting software companies and cloud-first environments.
- Intelligence-to-action strategy: Ensure intelligence is translated into detections, controls, and prioritized remediation rather than remaining informational.
- Collection management (lightweight): Identify and tune sources (commercial, ISACs, OSINT, internal telemetry) to meet intelligence requirements.
- Metrics-driven program improvement: Define measurable outcomes for threat intel (adoption, detection improvements, remediation prioritization impact).
Operational responsibilities
- Daily triage of intel and indicators: Review feeds, advisories, and internal telemetry; assess relevance and confidence.
- IOC lifecycle management: Validate indicators, assess context and expiration, reduce false positives, and track usage in detections.
- Intel support to SOC/IR: Provide rapid context during active investigations (actor attribution hypothesis, infrastructure analysis, campaign patterns).
- Vulnerability exploitation awareness: Monitor exploited vulnerabilities (KEV lists, vendor advisories, exploitation chatter) and inform patch prioritization.
- Threat briefings to stakeholders: Provide concise briefings to SOC leadership, security engineering, and product security; tailor to technical vs executive audiences.
- Takedown and abuse support (context-specific): Support anti-phishing, brand abuse, and malicious infrastructure reporting processes when relevant to the company.
Technical responsibilities
- TTP mapping to MITRE ATT&CK: Translate observed behaviors into ATT&CK techniques; identify detection gaps and mitigation opportunities.
- Enrichment and correlation: Enrich alerts and incidents with intel (WHOIS/DNS, passive DNS, malware family patterns, threat actor infrastructure).
- Detection content enablement: Partner with detection engineers to convert intel into SIEM queries, EDR hunts, rules, dashboards, and threat hunting hypotheses.
- Threat hunting support: Formulate hunts based on campaigns, TTPs, and environment-specific telemetry; document results and next steps.
- Malware and phishing analysis (baseline): Perform static/dynamic triage, sandboxing, header analysis, URL detonation, and attachment analysis; escalate to DFIR/malware reverse engineers if present.
- Scripting and automation: Develop lightweight automation (parsing feeds, IOC normalization, enrichment workflows, reporting templates).
Cross-functional / stakeholder responsibilities
- Intel dissemination and knowledge management: Maintain playbooks, internal wiki pages, and recurring intelligence digests aligned to stakeholder needs.
- Vendor and source evaluation: Assist in evaluating threat intel providers, OSINT sources, and community memberships; recommend improvements.
- Customer/security communications support (context-specific): Provide input for security advisories, customer trust responses, and incident comms with evidence-backed clarity.
Governance, compliance, and quality responsibilities
- Analytic rigor and sourcing: Use structured analytic techniques; clearly label confidence levels, assumptions, and sourcing.
- Data handling and privacy: Ensure intelligence handling complies with policies (data classification, PII handling, retention, acceptable use).
- Quality assurance on intel artifacts: Ensure indicators, reports, and briefs are accurate, actionable, and aligned to requirements; perform peer review where possible.
Leadership responsibilities (applicable but limited for this title)
- Mentorship and enablement: Coach SOC analysts on intel consumption, indicator interpretation, and adversary behavior concepts.
- Operational leadership in an incident (as SME): Act as an intelligence SME during incident bridges, providing concise, decision-oriented updates.
4) Day-to-Day Activities
Daily activities
- Review high-signal sources:
- Vendor advisories (cloud providers, major security vendors)
- Exploited vulnerability trackers (e.g., CISA KEV)
- Threat intel platform alerts and curated feeds
- Internal SOC alerts with intel gaps or unclear context
- Validate and triage indicators:
- De-duplicate, normalize, enrich, score confidence, determine relevance
- Tag indicators with campaigns/actors where appropriate
- Support investigations:
- Rapid enrichment for suspicious IPs/domains/hashes
- Provide likely objectives and next-step hypotheses (credential theft, lateral movement, exfiltration)
- Update or propose detection improvements:
- Create intel-driven detection recommendations for SIEM/EDR
- Provide ATT&CK mapping and suggested telemetry sources
- Maintain working documentation:
- Short notes on emerging campaigns relevant to the environment
- Updates to IOC lists and expiration/validity status
Weekly activities
- Produce and distribute an intelligence digest:
- โWhat changed this weekโ summary tailored by audience (SOC vs engineering vs leadership)
- Join threat hunting and detection engineering sync:
- Present 1โ2 prioritized threats with recommended detections
- Review previous intel-driven detectionsโ effectiveness and tuning needs
- Participate in vulnerability triage:
- Highlight exploited-in-the-wild vulnerabilities relevant to stack (cloud services, CI/CD, IAM, VPN, endpoint agents)
- Review intel program metrics:
- Adoption rate of intel artifacts
- Count of intel-driven tickets and completion status
- False positives from indicators; improvements made
Monthly or quarterly activities
- Monthly threat landscape review:
- Trends by actor and technique, sector targeting, notable ransomware/extortion patterns
- Assessment of relevance to company architecture and products
- Quarterly PIR/SIR refresh:
- Ensure intelligence requirements align with evolving business priorities (new products, regions, acquisitions, cloud migrations)
- Tabletop support (quarterly/biannual):
- Provide adversary and scenario context for IR and crisis simulations
- Vendor/source evaluation:
- Assess feed performance and coverage; remove low-value sources; recommend new sources
Recurring meetings or rituals
- SOC standup (daily or several times per week)
- Detection engineering backlog grooming (weekly)
- Vulnerability triage meeting (weekly)
- Security leadership update (biweekly or monthly)
- Incident postmortems / retrospectives (as needed)
Incident, escalation, or emergency work
- During active incidents:
- Rapid assessment of likely threat actor/tooling based on observed indicators and TTPs
- Identify related infrastructure and potential victimology
- Provide containment recommendations (blocklists, sinkholes, identity resets, suspicious OAuth app removal)
- Monitor for re-infection/retargeting patterns
- Escalation patterns:
- High-confidence targeted intrusion indicators
- Evidence of data exfiltration or cloud control plane compromise
- Widespread phishing campaigns targeting employees or customers
- Exploited critical vulnerability affecting internet-exposed services
5) Key Deliverables
Concrete deliverables expected from a Threat Intelligence Analyst include:
- Weekly Threat Intelligence Digest (SOC-focused and engineering-focused variants)
- Executive-ready Monthly Threat Landscape Brief (1โ3 pages, risk-oriented)
- Intelligence Requirements (PIR/SIR) document and quarterly refresh notes
- IOC packages with: – Context (campaign/actor if known), confidence score, expiration guidance – Format compatibility for SIEM/EDR/TIP ingestion
- Intel-enriched incident notes (in ticketing/IR platform) with referenced sources and confidence statements
- ATT&CK technique mapping artifacts for prioritized threats and campaigns
- Detection recommendations (SIEM searches, EDR rules, use cases) with expected telemetry and validation approach
- Threat hunting hypotheses and outcomes documentation (what was tested, results, follow-ups)
- Vulnerability exploitation advisories tailored to the companyโs tech stack (what is exploited, what to check, what to patch/mitigate)
- Phishing/malicious infrastructure analysis summaries (domains, hosting, lure themes, impacted identities)
- Intel program metrics dashboard (adoption, timeliness, actionability, outcome correlation)
- Knowledge base pages/runbooks: – Indicator handling workflow – Source reliability notes – Common enrichment steps and tools
- Post-incident intelligence summaries: – Campaign linkage, lessons learned, recommended control improvements
- Vendor assessment input for threat intel tools and subscriptions (requirements, proof points, renewal recommendations)
6) Goals, Objectives, and Milestones
30-day goals (onboarding and baseline effectiveness)
- Understand business context:
- Company products/services, critical assets, cloud environments, identity model
- Current top risks and prior incident themes
- Learn existing security workflows:
- SOC alert triage process, SIEM/EDR tooling, SOAR playbooks (if any)
- Vulnerability management cadence and patch governance
- Establish credibility through quick wins:
- Deliver first weekly intel digest tailored to SOC needs
- Provide enrichment for at least 3 investigations with clear value (reduced time-to-triage, better containment decisions)
- Create an initial โrelevance filterโ:
- Define what intel is in-scope vs out-of-scope for the organization
60-day goals (operationalization and repeatability)
- Formalize and socialize PIRs/SIRs with security leadership and SOC
- Implement a repeatable IOC lifecycle:
- Validation rules, expiration windows, tagging standards
- False-positive review mechanism
- Produce at least 2 intel-driven detection recommendations that are accepted into backlog
- Build stakeholder rhythm:
- Regular touchpoints with detection engineering and vulnerability management
90-day goals (measurable security impact)
- Demonstrate measurable improvements:
- Reduced investigation time on intel-enriched alerts
- At least one new detection or hunt outcome directly tied to intel
- Deliver first monthly threat landscape brief with clear prioritization
- Establish baseline metrics:
- Actionability rate of intelligence outputs
- Adoption and conversion (intel โ ticket โ implemented control)
- Contribute to at least one incident/post-incident review with intelligence-driven recommendations
6-month milestones (program maturity and cross-functional embedding)
- Mature intelligence dissemination:
- Audience-specific outputs (SOC, engineering, leadership)
- A reliable publishing cadence and internal repository
- Strengthen vulnerability exploitation intelligence:
- Consistent โexploitation awareโ triage process integrated with vuln management
- Improve detection coverage mapping:
- ATT&CK mapping for top relevant threats; documented coverage gaps and roadmap proposals
- Implement light automation:
- IOC normalization/enrichment scripts or workflow enhancements that reduce manual effort
12-month objectives (strategic outcomes and sustained value)
- Establish threat intel as a measurable force multiplier:
- Demonstrable reduction in noise, improved response speed, or reduced exposure to exploited vulnerabilities
- Build a robust intelligence knowledge base:
- Threat actor profiles relevant to the company, common attack paths, lessons learned
- Mature partnerships:
- Detection engineering, cloud security, IAM, appsec/product security
- Support annual planning:
- Provide evidence-based input into security roadmap and investments (e.g., EDR improvements, identity hardening, logging expansion)
Long-term impact goals (multi-year)
- Shift the organization from reactive to anticipatory security:
- Early warning on threats targeting tech stack and sector
- Detections and controls aligned to evolving adversary tradecraft
- Create institutional knowledge and repeatable decision support:
- Reduced dependence on single individuals for intelligence context
- Influence architecture and engineering decisions:
- Logging and telemetry strategies designed with threat-informed defense in mind
Role success definition
The role is successful when intelligence outputs are consistently: – Relevant: tied to the companyโs assets, products, and exposure – Actionable: leading to detections, mitigations, hunts, or remediation – Timely: delivered early enough to change outcomes – Trusted: high signal-to-noise with clear confidence statements
What high performance looks like
- Produces intelligence that measurably improves SOC outcomes (faster triage, better containment)
- Anticipates stakeholder needs and reduces back-and-forth
- Maintains analytic rigor and avoids over-claiming attribution
- Builds repeatable workflows and automation to scale intelligence operations
- Becomes the go-to SME for adversary behavior relevant to the environment
7) KPIs and Productivity Metrics
The metrics below balance outputs (what is produced) with outcomes (what changes), plus quality, efficiency, reliability, collaboration, and stakeholder satisfaction.
| Metric name | What it measures | Why it matters | Example target / benchmark | Frequency |
|---|---|---|---|---|
| Actionable intelligence rate | % of intel outputs that result in a downstream action (ticket, detection change, hunt, mitigation) | Prevents โreporting for reportingโs sakeโ | 50โ70% of weekly items drive an action within 30 days | Monthly |
| Intel-to-ticket conversion | Number of intel items converted into trackable work (Jira/ServiceNow cases, detection backlog) | Creates accountability and throughput | 6โ12 actionable tickets/month (varies by size) | Monthly |
| Ticket completion rate (intel-driven) | % of intel-driven tickets completed within SLA | Ensures intel is operationalized | 70โ85% completed within agreed SLA | Monthly |
| Time-to-enrichment (TTE) | Time from request/alert to delivering useful intel context | Improves SOC speed and decision-making | Median < 30โ60 minutes for priority cases | Weekly/Monthly |
| Reduction in investigation time (supported cases) | Change in mean/median triage time for cases where intel is applied | Measures real SOC efficiency improvement | 10โ20% reduction on target use cases over 6โ12 months | Quarterly |
| False positive rate from intel IOCs | % of blocks/alerts caused by intel IOCs that are benign | Controls operational friction | < 5โ10% depending on indicator type and environment | Monthly |
| IOC freshness / staleness | % of active IOCs reviewed or expired within policy window | Reduces noise and unintended outages | 90% of IOCs have explicit expiration/TTL | Monthly |
| Detection coverage improvements (intel-driven) | Count of detections added/updated tied to a specific intel requirement | Links intel to prevention/detection | 2โ4 meaningful improvements/quarter | Quarterly |
| ATT&CK mapping completeness (for prioritized threats) | % of top threats with mapped techniques and recommended detections | Enables threat-informed defense | 80% of โtop 10 relevant threatsโ mapped within 6 months | Quarterly |
| Vulnerability exploitation advisory timeliness | Time from credible exploitation signal to internal advisory | Reduces exposure window | < 24โ72 hours for high relevance vulnerabilities | Monthly |
| Exploited vuln remediation influence | % of exploited-in-the-wild vulnerabilities prioritized/mitigated due to intel input | Demonstrates tangible risk reduction | 70%+ of relevant KEVs receive priority action | Quarterly |
| Stakeholder satisfaction score | Qualitative rating from SOC/IR/Vuln Mgmt/Engineering on usefulness | Ensures outputs match needs | Average 4/5 or higher | Quarterly |
| Briefing effectiveness | Attendance + feedback + follow-up actions from briefings | Ensures communication drives decisions | 1โ2 briefings/month with documented follow-ups | Monthly |
| Source quality index | Ratio of high-value items to total feed volume; source hit rate | Prevents overload and waste | Identify top 5 sources delivering 80% of value | Quarterly |
| Automation leverage | % of enrichment/IOC handling steps automated | Scales analyst capacity | Automate 1โ2 workflows per half-year | Quarterly |
| Collaboration throughput | # of cross-functional engagements resulting in decisions (detections, mitigations, comms) | Reflects embeddedness in org | 8โ15 meaningful collaborations/month | Monthly |
| Post-incident intelligence contributions | Count and quality of intel-driven lessons learned in retros | Improves resilience | Intel section in 100% of relevant incident retros | Quarterly |
Notes on benchmarks: – Targets vary significantly by company size, threat profile, and tooling maturity. – A smaller organization may emphasize timeliness and actionability over volume. – A mature enterprise may track more granular outcomes (e.g., MTTD/MTTR deltas attributable to intel).
8) Technical Skills Required
Below are tiered technical skills with description, typical use, and importance.
Must-have technical skills
-
Threat intelligence fundamentals (Critical)
– Description: Intelligence lifecycle, collection, processing, analysis, dissemination, feedback loops; structured analysis basics.
– Use: Turning raw data into actionable insights with clear confidence and sourcing. -
Indicator analysis and validation (Critical)
– Description: IOC types (hashes, IPs, domains, URLs, email artifacts), validation methods, and common pitfalls.
– Use: Reducing false positives, preventing harmful blocks, improving SOC signal. -
MITRE ATT&CK and TTP-based analysis (Critical)
– Description: Mapping behaviors to techniques; linking detections to adversary tradecraft.
– Use: Communicating threats in a common language; identifying detection gaps. -
Security telemetry interpretation (Critical)
– Description: Understanding endpoint, network, identity, and cloud logs at a practical level.
– Use: Advising hunts and detections; contextualizing alerts. -
SIEM querying basics (Important)
– Description: Ability to read/write common queries (e.g., SPL, KQL, Lucene/ES queries).
– Use: Validating hypotheses, supporting detections, triaging incidents. -
OSINT and enrichment techniques (Critical)
– Description: WHOIS, DNS, passive DNS, certificate transparency, URL analysis, reputation sources.
– Use: Expanding investigations beyond a single indicator; identifying clusters. -
Vulnerability and exploitation awareness (Important)
– Description: CVE ecosystem, severity vs exploitability, KEV-style prioritization.
– Use: Advising vulnerability management and engineering on real-world risk. -
Basic malware/phishing analysis (Important)
– Description: Email header analysis, sandbox triage, file hash reputation, basic static/dynamic indicators.
– Use: Supporting SOC triage; identifying delivery mechanisms and payload families. -
Scripting / data handling (Important)
– Description: Practical Python (preferred) or similar scripting for parsing, normalization, API use.
– Use: Automating enrichment, generating reports, manipulating indicators. -
Documentation and knowledge management (Critical)
– Description: Clear technical writing, evidence-based reporting, reproducible analysis.
– Use: Making intelligence consumable and reusable across teams.
Good-to-have technical skills
-
Threat Intelligence Platforms (TIP) and standards (Important)
– Description: Familiarity with TIP workflows and formats (STIX/TAXII basics).
– Use: Efficiently managing feeds, indicator sharing, and lifecycle. -
SOAR concepts (Optional to Important, depending on org)
– Description: Automating enrichment, triage, and response playbooks.
– Use: Scaling the intel function and reducing manual work. -
Cloud security fundamentals (Important)
– Description: AWS/Azure/GCP concepts, IAM risks, cloud logging.
– Use: Tracking cloud-focused threats and advising mitigations. -
Identity and SaaS attack patterns (Important)
– Description: OAuth abuse, token theft, MFA bypass, session hijacking.
– Use: Prioritizing identity-centric detections and mitigations. -
Detection engineering collaboration skills (Important)
– Description: Translating intel into logic and data requirements for detections.
– Use: Increasing adoption and quality of detections. -
Basic digital forensics concepts (Optional)
– Description: Evidence handling, timelines, artifact types.
– Use: Working effectively with IR/DFIR teams.
Advanced or expert-level technical skills (not always required for this title)
-
Advanced malware analysis / reverse engineering (Optional)
– Use: Deep dive on custom malware, high-impact incidents, attribution support. -
Intrusion set / campaign clustering (Optional to Important)
– Use: Linking infrastructure and TTPs across incidents; identifying persistent targeting. -
Data science for threat intel (Optional)
– Use: Trend analysis, anomaly detection on large indicator sets, enrichment scoring models. -
Purple teaming and adversary emulation (Optional)
– Use: Turning intel into test plans for controls and detections.
Emerging future skills for this role (next 2โ5 years)
-
AI-assisted intelligence operations (Important)
– Use: Summarization, correlation, prioritization; building guardrails for accuracy. -
Attack surface intelligence and external exposure monitoring (Important)
– Use: Continuous monitoring of exposed assets, leaked credentials, third-party exposure. -
Cloud-native adversary tradecraft specialization (Important)
– Use: Focus on identity-first, API abuse, supply chain compromise, cloud lateral movement. -
Security data product thinking (Optional to Important)
– Use: Treating intel outputs as products with adoption metrics, SLAs, and user research.
9) Soft Skills and Behavioral Capabilities
-
Analytical rigor and skepticism
– Why it matters: Threat intel often contains ambiguity, vendor bias, and incomplete evidence.
– On the job: Uses confidence levels, avoids over-attribution, checks multiple sources.
– Strong performance: Produces conclusions that hold up under scrutiny; clearly separates facts from hypotheses. -
Clear, audience-tailored communication
– Why it matters: Intelligence must be consumed by SOC analysts, engineers, and executives.
– On the job: Writes concise briefs, uses structured formats (summary, impact, recommendations).
– Strong performance: Stakeholders act on outputs without needing translation meetings. -
Prioritization and focus (signal over noise)
– Why it matters: The threat landscape is infinite; time and attention are not.
– On the job: Filters feeds based on PIRs, business context, and relevance to stack.
– Strong performance: Produces fewer, higher-impact outputs that consistently drive action. -
Collaboration and influence without authority
– Why it matters: Threat intel rarely โownsโ remediation; it must influence others.
– On the job: Partners with detection engineering, vuln mgmt, cloud security, appsec.
– Strong performance: Intel routinely turns into tickets and implemented controls. -
Operational urgency and calm under pressure
– Why it matters: During incidents, stakeholders need quick, accurate context.
– On the job: Provides rapid enrichment, concise recommendations, avoids speculation spirals.
– Strong performance: Helps incident commanders make decisions faster with fewer mistakes. -
Curiosity and continuous learning
– Why it matters: Adversaries change tactics; tools and platforms evolve.
– On the job: Tracks new attack paths (identity, cloud APIs, supply chain), tests hypotheses.
– Strong performance: Brings new insights that meaningfully shift security posture. -
Quality mindset and attention to detail
– Why it matters: Incorrect blocks or misleading intel can cause outages or missed threats.
– On the job: Validates indicators, documents sources, sets expirations, peer-reviews when possible.
– Strong performance: Maintains high trust; low rework rate; few โintel-caused incidents.โ -
Ethical judgment and confidentiality
– Why it matters: Intel work may involve sensitive incident data and external sharing constraints.
– On the job: Applies data classification, respects privacy constraints, avoids oversharing.
– Strong performance: Zero policy violations; strong partnership with Legal/GRC when needed.
10) Tools, Platforms, and Software
Tools vary by organization; the list below reflects what is genuinely common for threat intelligence operations in software/IT security teams.
| Category | Tool / platform | Primary use | Common / Optional / Context-specific |
|---|---|---|---|
| Threat intelligence platforms (TIP) | ThreatConnect, Anomali, Recorded Future (platform), MISP | Manage intel sources, IOCs, scoring, workflows | Common (varies by budget; MISP common in cost-sensitive orgs) |
| Intel standards / sharing | STIX/TAXII | Structured sharing and ingestion | Optional (Common in mature orgs) |
| SIEM | Splunk, Microsoft Sentinel, Elastic Security | Query logs, correlate, support detections/hunts | Common |
| SOAR | Cortex XSOAR, Splunk SOAR, Sentinel playbooks | Automate enrichment, triage, response | Optional to Common (depends on SOC maturity) |
| EDR | CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne | Endpoint telemetry, hunts, IOC blocking | Common |
| Network security / NDR | Zeek, Suricata, Corelight, Vectra | Network detections, traffic analysis | Context-specific (more common in larger/mature orgs) |
| Cloud platforms | AWS, Azure, GCP | Understand cloud threats and logs | Common |
| Cloud security | Wiz, Prisma Cloud, Microsoft Defender for Cloud | Exposure and misconfig monitoring | Optional to Common |
| Identity | Okta, Entra ID (Azure AD), Ping | Identity event analysis, attack pattern detection | Common (one or more) |
| Email security | Proofpoint, Microsoft Defender for Office 365, Mimecast | Phishing analysis, IOC extraction | Common |
| Vulnerability management | Tenable, Qualys, Rapid7 | Vuln tracking and prioritization inputs | Common |
| Case management / ITSM | ServiceNow, Jira | Track intel-driven actions and investigations | Common |
| IR / collaboration | Slack, Microsoft Teams | Incident comms, quick intel dissemination | Common |
| Documentation | Confluence, Notion, SharePoint | Knowledge base, reports | Common |
| Threat modeling / ATT&CK tooling | ATT&CK Navigator | Mapping techniques, coverage visualization | Common |
| OSINT enrichment | VirusTotal, urlscan.io, AbuseIPDB, GreyNoise | IOC enrichment and validation | Common (some are paid tiers) |
| DNS / passive DNS | DomainTools, RiskIQ (context-specific), SecurityTrails | Infrastructure analysis | Optional to Context-specific |
| Certificate transparency | crt.sh | Discover related domains and infrastructure | Common (lightweight) |
| Link analysis | Maltego | Relationship mapping across artifacts | Optional |
| Sandboxing | Cuckoo Sandbox, Any.Run, Joe Sandbox | Malware detonation and behavior | Optional to Context-specific |
| Repos / version control | GitHub / GitLab | Store detection notes, scripts, parsers | Common |
| Scripting / automation | Python, PowerShell | API integrations, parsing, normalization | Common |
| Data analytics | Jupyter, Pandas, Spark (rare), SQL | Analysis, enrichment scoring, trend reporting | Optional to Context-specific |
| Observability | Datadog, Grafana, Prometheus | Context on system behavior (indirect) | Context-specific |
| Secure browsing | Isolated browser solutions | Safe analysis of malicious links | Optional |
11) Typical Tech Stack / Environment
Infrastructure environment
- Predominantly cloud-hosted infrastructure (AWS/Azure/GCP), often multi-account/subscription.
- Mix of Kubernetes and managed services (e.g., S3/Blob storage equivalents, managed databases, queueing).
- Some hybrid connectivity (VPNs, identity federation, third-party SaaS).
Application environment
- SaaS products with public APIs and customer-facing web applications.
- Microservices architectures common; CI/CD pipelines heavily used.
- Heavy reliance on identity providers and token-based auth (OIDC/SAML, OAuth).
Data environment
- Centralized logging into SIEM (cloud logs, endpoint logs, identity logs, app logs where available).
- Data sources include:
- Cloud audit logs (CloudTrail, Azure Activity Logs, GCP Audit Logs)
- Identity logs (Okta/Entra)
- Endpoint telemetry (EDR)
- Email security logs
- WAF/CDN logs (e.g., Cloudflare/Akamai, context-specific)
- Threat intel data in TIP or curated sources, often enriched via APIs.
Security environment
- SOC function with tiered analysts and escalation to IR/DFIR.
- Detection engineering capability exists or is developing; intel supports use cases and hunts.
- Vulnerability management with patch cycles and emergency patch procedures.
- GRC may require evidence for controls (SOC 2 / ISO 27001) and incident documentation.
Delivery model
- Agile/DevOps environment; security integrates through ticketing and backlog processes.
- Threat intel work delivered as:
- Operational support (incidents and investigations)
- Scheduled outputs (digests, briefs)
- Backlog items (detections, integrations, automation)
Scale / complexity context
- Typically moderate-to-high volume of alerts and external intelligence.
- Complexity arises from:
- Rapid product changes
- Multiple cloud services and third-party SaaS dependencies
- Evolving threat landscape focused on identity and supply chain
Team topology
- Threat Intelligence Analyst sits within Security Operations or Security Engineering, partnering closely with:
- SOC analysts
- Detection engineers
- IR lead/manager
- Vulnerability manager
- Cloud security engineers
- AppSec/Product security
12) Stakeholders and Collaboration Map
Internal stakeholders
- SOC Analysts (Tier 1โ3): Primary consumers of intel enrichment and IOC context.
- Detection Engineering: Converts intel into detection logic, dashboards, and alert tuning.
- Incident Response / DFIR: Uses intel to scope incidents, track adversary infrastructure, and understand toolchains.
- Vulnerability Management: Uses exploitation intel to prioritize patching and mitigations.
- Cloud Security / Platform Security: Needs intel on cloud attack techniques and misconfiguration exploitation.
- IAM / Identity Security: Needs intel on credential phishing, MFA bypass, OAuth abuse, and session theft.
- AppSec / Product Security: Needs intel on vulnerabilities affecting frameworks, dependencies, and product attack surface.
- GRC / Risk: Needs evidence-based reporting and alignment to control objectives.
- Security Leadership (CISO/Director): Needs strategic summaries, trend analysis, and prioritization recommendations.
External stakeholders (context-specific)
- Threat intel vendors / ISACs: Source material, advisory validation, sharing.
- Law enforcement or incident response retainers: In major incidents, for coordination and specialized analysis.
- Customers / customer security contacts: Only when providing security communications or responding to trust questionnaires (usually mediated via Customer Success/Legal).
- Third-party SaaS providers: For abuse reporting, takedowns, or coordinated response.
Peer roles
- Threat Hunter
- Detection Engineer
- SOC Analyst (Tier 2/3)
- Vulnerability Analyst
- Security Engineer (Cloud/IAM)
- Product Security Analyst
Upstream dependencies
- Quality of telemetry (logging completeness, normalization)
- Access to tools and subscriptions (TIP, sandbox, enrichment APIs)
- Established incident and ticket workflows (clear SLAs and ownership)
Downstream consumers
- SOC playbooks and alert triage processes
- Detection backlog and implementation teams
- Patch and remediation owners (IT and engineering)
- Leadership risk decisions and communications
Nature of collaboration
- High-frequency / operational: SOC, IR, detection engineering
- Cadenced / planning-oriented: vulnerability management, security leadership, GRC
- Ad hoc / high-impact: product security for urgent dependency issues, identity teams during targeted phishing
Typical decision-making authority
- The Threat Intelligence Analyst typically recommends actions and priorities, backed by evidence.
- Implementation decisions are shared with SOC leadership, detection engineering, and remediation owners.
Escalation points
- Escalate to SOC/IR leadership when:
- High-confidence targeted intrusion indicators appear
- Evidence suggests active exploitation of critical systems
- Attribution implies high capability adversary (context-specific) or repeated targeting
- Escalate to Legal/Privacy when:
- Data breach indicators appear
- External sharing or customer notification may be required
- Escalate to IT/Engineering leadership when:
- Emergency patching or disruptive mitigations are needed
13) Decision Rights and Scope of Authority
Can decide independently
- Relevance filtering: what intel items to track and disseminate based on PIRs
- Confidence scoring and analytic judgments (with documented rationale)
- IOC validation outcomes (valid/invalid/needs more data)
- Publication format and cadence for digests/briefs (within agreed expectations)
- Enrichment and analysis methods used during investigations
- Proposing detection and remediation recommendations with supporting evidence
Requires team approval (SOC/IR/D&R coordination)
- Adding high-impact blocks that may disrupt business (e.g., broad IP ranges, popular domains)
- IOC deployment into production blocking controls (firewall/WAF/EDR blocklists) depending on policy
- Changes to SOC alerting thresholds and detection logic (owned by detection engineering/SOC leadership)
- Standardization of tagging/taxonomy in TIP and SIEM (shared with platform owners)
Requires manager/director/executive approval
- Procurement or renewal of threat intel subscriptions and tooling (budget authority typically above)
- Formal external intelligence sharing agreements and memberships
- Public-facing statements and customer communications related to threats or incidents
- Major program changes (new TIP rollout, SOC operating model changes)
Budget, vendor, delivery, hiring, compliance authority
- Budget: Typically no direct budget ownership; provides input and ROI rationale.
- Vendor: Can evaluate and recommend; contract decisions made by leadership/procurement.
- Delivery: Owns delivery of intel artifacts; shared delivery for detections/controls with engineering teams.
- Hiring: May support interviews and assessments; not typically a hiring manager.
- Compliance: Must adhere to policies; can contribute evidence and documentation.
14) Required Experience and Qualifications
Typical years of experience
- 3โ6 years in security operations, threat intelligence, incident response support, or threat hunting-related roles.
Education expectations
- Bachelorโs degree in cybersecurity, computer science, information systems, or equivalent experience.
- Equivalent experience may include military/defense intel backgrounds adapted to cyber, provided technical fluency is demonstrated.
Certifications (relevant; not all required)
Common / valued: – CompTIA Security+ (baseline, especially earlier career) – GIAC GCTI (Cyber Threat Intelligence) (context-specific but highly aligned) – GIAC GCIA / GCIH (useful for network analysis and incident handling) – SANS SEC487 (Practical Open-Source Intelligence) (helpful) – MITRE ATT&CK training certificates (various providers)
Optional / context-specific: – CISSP (more senior/generalist; not required for this mid-level IC) – Vendor certs (Splunk, Sentinel, CrowdStrike) if the org is heavily invested
Prior role backgrounds commonly seen
- SOC Analyst (Tier 2/3)
- Threat Hunter / Junior Threat Hunter
- Incident Response Analyst (supporting role)
- Vulnerability Analyst with exploitation focus
- Security Analyst in a cloud-first environment
- Intelligence analyst transitioning into cyber with strong technical upskilling
Domain knowledge expectations
- Strong understanding of:
- Common intrusion kill chains and attacker objectives (credential theft, persistence, lateral movement, exfiltration)
- Phishing and identity attacks
- Cloud/IAM risks in SaaS environments
- CVE lifecycle and exploitation signals
- Familiarity with software/IT operational realities:
- Change management, deployment cycles, uptime constraints, and production safety
Leadership experience expectations
- Not required to have people management experience.
- Expected to lead through influence: run briefings, coordinate intel-driven actions, mentor junior analysts.
15) Career Path and Progression
Common feeder roles into this role
- SOC Analyst (Tier 2 preferred)
- Incident Response Analyst (junior to mid)
- Vulnerability Management Analyst (with exploitation intelligence exposure)
- Security Analyst with strong OSINT and investigation focus
Next likely roles after this role
- Senior Threat Intelligence Analyst
- Threat Intelligence Lead (IC lead or small team lead)
- Threat Hunter / Senior Threat Hunter
- Detection Engineer (especially if SIEM/EDR skills are strong)
- Incident Response Lead (if investigations and coordination skills deepen)
- Security Researcher (context-specific; more common in product security orgs)
Adjacent career paths
- Product Security / AppSec: focus on vulnerability intelligence affecting product dependencies and customer environments
- Cloud Security Engineering: focus on cloud threat patterns and controls
- GRC / Risk Intelligence: translating threat landscape to enterprise risk decisions
- Fraud/Abuse / Trust & Safety (context-specific in consumer SaaS): phishing, brand abuse, malicious automation
Skills needed for promotion (to Senior)
- Ability to lead intelligence programs end-to-end:
- Define PIRs, manage sources, measure outcomes, drive adoption
- Stronger technical depth:
- Cloud identity tradecraft, deeper SIEM/EDR expertise, advanced enrichment
- Demonstrated outcomes:
- Intel directly leading to improved detections and measurable response improvements
- Strong stakeholder management:
- Regular executive-ready briefings; clear prioritization and recommendations
How this role evolves over time
- Early: Focus on validation, enrichment, and operational support.
- Mid: Own PIRs, reporting cadence, and detection enablement.
- Later: Shape threat-informed defense strategy, integrate with planning cycles, and influence security architecture and telemetry investments.
16) Risks, Challenges, and Failure Modes
Common role challenges
- Noise overload: Too many feeds and advisories; difficulty filtering for relevance.
- Ambiguity and attribution pressure: Stakeholders may demand certainty; evidence may be incomplete.
- Operationalization gap: Intelligence produced but not converted into backlog items, detections, or mitigations.
- Data limitations: Missing logs, weak endpoint coverage, limited visibility into cloud workloads.
- Tool sprawl: Multiple platforms with overlapping features; integration gaps.
Bottlenecks
- Lack of detection engineering bandwidth to implement recommendations
- Slow patch cycles or unclear ownership for remediation
- Insufficient automation causing manual enrichment and burnout
- Unclear SLAs for โintel requestsโ during investigations
Anti-patterns
- โIOC dumpingโ without context, confidence, or expiration guidance
- Over-reliance on vendor-provided scores without independent validation
- Producing long reports that arenโt tied to decisions or actions
- Chasing trending threats unrelated to the companyโs actual exposure
- Blocking indicators too aggressively, causing production or user impact
Common reasons for underperformance
- Weak understanding of the companyโs architecture and business priorities
- Inability to write actionable recommendations (only summaries)
- Poor stakeholder engagement; intel outputs not tailored to consumer needs
- Insufficient technical skills to validate indicators and interpret telemetry
- Lack of process discipline (no lifecycle management, no metrics)
Business risks if this role is ineffective
- Increased likelihood of missed early warning signs and slower incident response
- Poor prioritization of vulnerability remediation, leaving exploitable exposures open longer
- Higher SOC workload due to false positives and lack of context
- Reduced confidence from leadership and customers due to unclear threat narratives
- Inefficient spending on threat intel tooling with minimal realized value
17) Role Variants
By company size
- Startup / small SaaS (<200 employees):
- Often a โsecurity generalistโ variant; threat intel is part-time alongside SOC duties or security engineering.
- Emphasis on pragmatic vulnerability exploitation tracking and phishing defense.
- Mid-size (200โ2000):
- Clearer separation: dedicated Threat Intelligence Analyst supports SOC, IR, and vuln management.
- Establishes repeatable digests, IOC workflows, and detection enablement.
- Enterprise (2000+):
- More specialized roles: strategic intel, tactical intel, malware analysts, intel engineering, collection management.
- Stronger governance, formal PIRs, and external sharing programs.
By industry
- B2B SaaS (typical for software company context):
- Focus on identity attacks, cloud control plane, API abuse, supply chain risks.
- Financial services / fintech (regulated):
- Higher emphasis on fraud crossover, brand abuse, regulatory reporting, and formal intelligence processes.
- Healthcare / critical infrastructure (high regulation):
- Stronger compliance constraints and higher emphasis on ransomware/extortion preparedness.
By geography
- Regional differences affect:
- Data privacy handling (PII constraints, retention)
- Sharing rules and breach notification obligations
- Threat actor relevance (some targeting is region-specific)
- The core competency model remains consistent globally.
Product-led vs service-led company
- Product-led SaaS:
- Stronger partnership with product security and engineering; focus on protecting platform and customer trust.
- Service-led / IT services / MSP:
- More customer-specific intelligence, multi-tenant incident patterns, and broader industry coverage.
Startup vs enterprise operating model
- Startup:
- Fewer tools; more manual OSINT; speed over formal process.
- Enterprise:
- Formalized intelligence requirements, dedicated TIP/SOAR, evidence standards, and governance.
Regulated vs non-regulated environment
- Regulated:
- More documentation rigor; clearer audit trails; stricter data handling.
- Non-regulated:
- More flexibility in experimentation and tooling; still needs quality control to avoid operational harm.
18) AI / Automation Impact on the Role
Tasks that can be automated (increasingly)
- Feed ingestion, de-duplication, and normalization (indicator parsing, tagging)
- Automated enrichment:
- WHOIS/DNS/passive DNS lookups
- Reputation checks and sandbox submission workflows
- Drafting first-pass summaries of vendor advisories and long reports
- Correlating indicators across sources and internal telemetry
- Suggested ATT&CK mappings (with human review)
- Ticket creation templates and routing based on PIR categories
Tasks that remain human-critical
- Relevance determination tied to business context and architecture
- Judgment on confidence, deception, and adversary intent
- Trade-off decisions (e.g., blocking vs business impact)
- Explaining โso whatโ to leadership and engineering
- Structured analytic reasoning and avoiding hallucinated attribution
- Building trust and influencing cross-functional execution
How AI changes the role over the next 2โ5 years
- From producer to editor/curator: Analysts will spend less time compiling and more time validating, prioritizing, and operationalizing.
- Higher expectations for speed: Stakeholders will expect faster turnaround on enrichment and summaries.
- More emphasis on measurement: Automated outputs increase volume; analysts must prove impact via conversion and outcomes.
- Rise of โintel engineeringโ: Building pipelines, guardrails, and evaluation methods for AI-assisted enrichment and summarization.
- Adversary AI use: More convincing phishing, faster malware iteration, and automated recon will shift intelligence focus toward identity, behavioral detections, and anomaly patterns.
New expectations caused by AI, automation, or platform shifts
- Ability to evaluate AI-generated outputs for accuracy and bias
- Operating โhuman-in-the-loopโ workflows with clear QA gates
- Building lightweight evaluation metrics:
- Precision/recall proxies for enrichment usefulness
- Error rate tracking for AI summaries
- Stronger integration with detection engineering to keep pace with faster-changing threats
19) Hiring Evaluation Criteria
What to assess in interviews
- Threat intel fundamentals: Can the candidate explain the intelligence lifecycle and apply it pragmatically?
- Technical validation ability: Can they validate an IOC and explain false positive risks?
- MITRE ATT&CK fluency: Can they map observed behaviors to techniques and propose detections?
- Communication: Can they write a short, actionable advisory and deliver a concise verbal brief?
- Stakeholder mindset: Do they think in terms of outcomes (detections, mitigations) rather than reports?
- Integrity and rigor: Do they use confidence levels and avoid overstated attribution?
Practical exercises or case studies (recommended)
-
IOC triage and enrichment exercise (45โ60 minutes) – Provide: a domain, IP, URL, and file hash + minimal incident context. – Ask: determine relevance, enrichment steps, confidence score, expiration/TTL, and recommended actions. – Evaluate: methodology, correctness, and operational safety.
-
Vulnerability exploitation prioritization case (45 minutes) – Provide: a critical CVE affecting a common component; mixed signals about exploitation. – Ask: produce a one-page internal advisory: what to patch, what to monitor, what to mitigate if patching delays occur. – Evaluate: practical guidance, clarity, and prioritization logic.
-
ATT&CK mapping + detection recommendation (45โ60 minutes) – Provide: narrative of an intrusion chain (initial access via phishing, token abuse, persistence, exfil). – Ask: map to ATT&CK techniques and propose 3 detections and required telemetry. – Evaluate: realism, telemetry awareness, and detection practicality.
-
Writing test (asynchronous, 30โ45 minutes) – Produce: a weekly intel digest item (200โ300 words) with โSummary / Why it matters / Recommended actions / Confidence.โ – Evaluate: clarity, actionability, and stakeholder-fit.
Strong candidate signals
- Demonstrates a repeatable analysis approach (not just tool usage)
- Uses multiple sources to validate claims; understands source reliability
- Talks in outcomes: โthis led to a detection,โ โthis reduced triage timeโ
- Understands modern SaaS/cloud identity threats
- Comfortable writing queries or at least interpreting SIEM/EDR outputs
- Shows mature judgment about blocking and operational impact
Weak candidate signals
- Focuses on volume of indicators rather than relevance/actionability
- Over-attributes based on weak signals (e.g., โthis is definitely APT-Xโ)
- Cannot explain how intelligence becomes a detection or mitigation
- Limited understanding of logs/telemetry and how organizations detect attacks
- Produces overly long, non-decisive narratives
Red flags
- Willingness to deploy broad blocks without validation or expiration
- Dismissive attitude toward documentation, evidence, or confidence statements
- Poor ethical judgment around sensitive data or external sharing
- Inflated claims about past work without demonstrable artifacts or explanation
- Inability to adapt communication for technical vs executive audiences
Scorecard dimensions (use in hiring panels)
| Dimension | What โmeets barโ looks like | What โexceedsโ looks like |
|---|---|---|
| Threat intel methodology | Understands lifecycle, can apply to casework | Defines PIRs, feedback loops, and measurable outcomes |
| Technical validation | Validates IOCs, uses enrichment correctly | Identifies subtle false positives and proposes automation |
| ATT&CK / TTP analysis | Maps basic chain to techniques | Identifies detection gaps and prioritizes by feasibility/impact |
| SIEM/EDR literacy | Interprets basic logs/queries | Writes practical queries and collaborates well with detection engineers |
| Communication | Clear, concise summaries with actions | Executive-ready briefs; adapts content to audience expertly |
| Stakeholder influence | Works well with SOC/IR | Drives adoption and alignment across multiple teams |
| Operational judgment | Understands risk trade-offs | Anticipates business impact; proposes safe staged rollouts |
| Learning mindset | Keeps up with threats | Proactively brings new insights and improves team practices |
20) Final Role Scorecard Summary
| Category | Summary |
|---|---|
| Role title | Threat Intelligence Analyst |
| Role purpose | Deliver actionable, timely, and relevant threat intelligence that improves detection, response, and remediation outcomes for a software/IT organization. |
| Top 10 responsibilities | 1) Define PIRs/SIRs aligned to business risk 2) Monitor threat landscape relevant to SaaS/cloud 3) Validate and manage IOC lifecycle 4) Provide rapid enrichment for investigations 5) Map threats to MITRE ATT&CK 6) Produce digests and executive briefs 7) Drive intel-to-action via tickets/detection recommendations 8) Support threat hunting hypotheses and outcomes 9) Provide exploitation-aware vulnerability advisories 10) Maintain knowledge base and metrics dashboard |
| Top 10 technical skills | 1) Intel lifecycle & structured analysis 2) IOC validation/enrichment 3) MITRE ATT&CK mapping 4) Security telemetry interpretation 5) SIEM querying basics 6) OSINT methods (DNS/WHOIS/CT logs) 7) Vulnerability exploitation awareness 8) Phishing/malware triage 9) Python scripting for automation 10) Documentation and evidence-based reporting |
| Top 10 soft skills | 1) Analytical rigor 2) Audience-tailored communication 3) Prioritization 4) Influence without authority 5) Calm urgency in incidents 6) Curiosity/continuous learning 7) Attention to detail 8) Ethical judgment/confidentiality 9) Collaboration 10) Outcome orientation |
| Top tools or platforms | TIP (ThreatConnect/Anomali/MISP/Recorded Future), SIEM (Splunk/Sentinel/Elastic), EDR (CrowdStrike/Defender/SentinelOne), OSINT (VirusTotal/urlscan/GreyNoise), ATT&CK Navigator, ITSM (Jira/ServiceNow), Python, Slack/Teams, Vulnerability tools (Tenable/Qualys/Rapid7) |
| Top KPIs | Actionable intelligence rate, intel-to-ticket conversion, time-to-enrichment, false positive rate from IOCs, detection coverage improvements (intel-driven), vulnerability advisory timeliness, exploited vuln remediation influence, stakeholder satisfaction, IOC freshness, post-incident intel contributions |
| Main deliverables | Weekly intel digest, monthly threat landscape brief, PIR/SIR document, IOC packages with context/TTL, detection recommendations, ATT&CK mappings, vulnerability exploitation advisories, intel-enriched incident notes, hunt hypotheses/results, metrics dashboard, knowledge base/runbooks |
| Main goals | 30/60/90-day operational integration and quick wins; 6-month repeatable workflows and automation; 12-month measurable improvements in detection/response and vulnerability prioritization; long-term shift toward threat-informed, proactive defense |
| Career progression options | Senior Threat Intelligence Analyst โ Threat Intelligence Lead / Threat Intel Program Owner; lateral to Threat Hunter, Detection Engineer, Incident Response Lead, Cloud Security/Identity Security specialist, or Product Security intelligence-focused roles |
Find Trusted Cardiac Hospitals
Compare heart hospitals by city and services โ all in one place.
Explore Hospitals