{"id":75070,"date":"2026-04-16T13:06:45","date_gmt":"2026-04-16T13:06:45","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/lead-threat-intelligence-specialist-role-blueprint-responsibilities-skills-kpis-and-career-path\/"},"modified":"2026-04-16T13:06:45","modified_gmt":"2026-04-16T13:06:45","slug":"lead-threat-intelligence-specialist-role-blueprint-responsibilities-skills-kpis-and-career-path","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/lead-threat-intelligence-specialist-role-blueprint-responsibilities-skills-kpis-and-career-path\/","title":{"rendered":"Lead Threat Intelligence Specialist: Role Blueprint, Responsibilities, Skills, KPIs, and Career Path"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">1) Role Summary<\/h2>\n\n\n\n<p>The <strong>Lead Threat Intelligence Specialist<\/strong> is a senior individual contributor who leads the design, execution, and operationalization of cyber threat intelligence (CTI) to reduce business risk and improve detection and response outcomes. This role turns external and internal threat signals into <strong>actionable intelligence<\/strong>: prioritized threats, attacker TTPs, indicators, assessments, and detection guidance that directly improves security posture.<\/p>\n\n\n\n<p>In a software company or IT organization, this role exists because modern adversaries move quickly across cloud, identity, endpoints, and SaaS; security teams need a dedicated capability to <strong>anticipate threats<\/strong>, <strong>contextualize risk<\/strong>, and <strong>drive defensive actions<\/strong> across SOC, incident response, vulnerability management, engineering, and leadership decision-making. The business value is improved prevention and detection, reduced incident impact, faster response, better security prioritization, and clearer executive risk narratives.<\/p>\n\n\n\n<p>This is a <strong>Current<\/strong> role (mature and widely adopted in contemporary security operating models). The role typically interacts with <strong>SOC\/Detection Engineering<\/strong>, <strong>Incident Response<\/strong>, <strong>Vulnerability Management<\/strong>, <strong>Cloud Security<\/strong>, <strong>Security Engineering<\/strong>, <strong>Product Security\/AppSec<\/strong>, <strong>IT<\/strong>, <strong>GRC<\/strong>, and <strong>executive stakeholders<\/strong> who consume risk insights.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">2) Role Mission<\/h2>\n\n\n\n<p><strong>Core mission:<\/strong><br\/>\nDeliver and operationalize high-fidelity threat intelligence that measurably improves the organization\u2019s ability to prevent, detect, respond to, and recover from cyber threats affecting its products, cloud infrastructure, workforce identity surface, and customer environments.<\/p>\n\n\n\n<p><strong>Strategic importance:<\/strong><br\/>\nThreat intelligence is the connective tissue between \u201cwhat is happening in the threat landscape\u201d and \u201cwhat we must do next.\u201d This role ensures the company\u2019s security investments and actions are aligned to the most relevant adversaries, tactics, and attack paths\u2014especially those targeting software supply chains, cloud control planes, identity systems, and customer-facing services.<\/p>\n\n\n\n<p><strong>Primary business outcomes expected:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reduced likelihood and impact of incidents through <strong>threat-driven prioritization<\/strong><\/li>\n<li>Faster, more accurate response through <strong>context-rich intelligence and attribution-quality analysis<\/strong><\/li>\n<li>Improved detection coverage (mapped to attacker behaviors, not just IOCs)<\/li>\n<li>Better executive decisions via <strong>clear threat\/risk reporting<\/strong><\/li>\n<li>Improved readiness through proactive assessments, tabletop inputs, and adversary emulation alignment<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">3) Core Responsibilities<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Strategic responsibilities<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Threat landscape strategy and prioritization<\/strong>\n   &#8211; Build and continuously refine the organization\u2019s prioritized threat landscape (top actor groups, malware families, TTPs, and attack paths relevant to the company\u2019s tech stack and business model).<\/li>\n<li><strong>Intelligence-led security roadmap influence<\/strong>\n   &#8211; Translate intelligence into security investment recommendations (e.g., detection gaps, control improvements, identity hardening, cloud logging coverage).<\/li>\n<li><strong>Adversary and campaign tracking<\/strong>\n   &#8211; Lead tracking of priority threats and campaigns; maintain a clear view of what matters most to the organization and why.<\/li>\n<li><strong>Threat modeling inputs<\/strong>\n   &#8211; Provide CTI inputs into product and infrastructure threat models, focusing on realistic adversary behaviors and exploitation trends.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Operational responsibilities<\/h3>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\">\n<li><strong>Intelligence production management<\/strong>\n   &#8211; Run an intelligence production lifecycle: collection, triage, analysis, production, dissemination, and feedback loops with stakeholders.<\/li>\n<li><strong>Stakeholder-facing intelligence briefs<\/strong>\n   &#8211; Produce routine and ad-hoc briefs for SOC, incident response, engineering leadership, and executives tailored to their needs and decision horizons.<\/li>\n<li><strong>Collection management<\/strong>\n   &#8211; Define collection requirements and manage feeds, sources, vendor relationships, and OSINT monitoring aligned to priority intelligence requirements (PIRs).<\/li>\n<li><strong>Incident support and escalation<\/strong>\n   &#8211; Provide intelligence support during incidents (actor assessment, infrastructure enrichment, victimology patterns, likely next steps, detection pivots, and containment guidance).<\/li>\n<li><strong>Threat intel program improvement<\/strong>\n   &#8211; Identify process gaps and implement improvements for repeatability, quality, and measurable impact (e.g., templates, SLAs, feedback loops, automation).<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Technical responsibilities<\/h3>\n\n\n\n<ol class=\"wp-block-list\" start=\"10\">\n<li><strong>Indicator and artifact analysis<\/strong>\n   &#8211; Analyze indicators (domains, IPs, hashes, certificates, URLs), attacker infrastructure, phishing kits, malware artifacts, and identity abuse signals; assess reliability and relevance.<\/li>\n<li><strong>Behavioral intelligence mapping<\/strong>\n   &#8211; Map threats to frameworks like <strong>MITRE ATT&amp;CK<\/strong> (enterprise and cloud) and convert to detection hypotheses and monitoring strategies.<\/li>\n<li><strong>Detection enablement<\/strong>\n   &#8211; Provide detection engineering with actionable content: Sigma-like logic, SIEM query prototypes, EDR hunt guidance, ATT&amp;CK coverage maps, and validation steps.<\/li>\n<li><strong>Threat hunting enablement<\/strong>\n   &#8211; Create hunt packages based on current campaigns and observed behaviors; support hunt execution with pivots and interpretation.<\/li>\n<li><strong>TIP \/ intel platform operations<\/strong>\n   &#8211; Lead configuration and operational use of a Threat Intelligence Platform (TIP): scoring, tagging, deduplication, confidence modeling, and distribution integrations (SIEM\/SOAR\/EDR).<\/li>\n<li><strong>Automation and enrichment<\/strong>\n   &#8211; Drive automation for enrichment and triage (sandbox detonation workflows, passive DNS, WHOIS, certificate transparency, reputation scoring, link analysis).<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Cross-functional or stakeholder responsibilities<\/h3>\n\n\n\n<ol class=\"wp-block-list\" start=\"16\">\n<li><strong>Security and engineering alignment<\/strong>\n   &#8211; Partner with Cloud Security, AppSec, IT, and Platform Engineering to translate intelligence into hardening actions (e.g., IAM guardrails, logging controls, patch prioritization).<\/li>\n<li><strong>Vulnerability and exposure prioritization<\/strong>\n   &#8211; Inform vulnerability management with exploitation trends (KEV alignment, active exploitation, exploit kit prevalence, weaponization timelines).<\/li>\n<li><strong>Customer and trust support (as applicable)<\/strong>\n   &#8211; Provide intelligence inputs to customer security questionnaires, trust communications, and major incident customer briefings\u2014coordinated through comms\/legal.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Governance, compliance, or quality responsibilities<\/h3>\n\n\n\n<ol class=\"wp-block-list\" start=\"19\">\n<li><strong>Intelligence governance<\/strong>\n   &#8211; Define and enforce intelligence handling guidelines (TLP, source protection, confidentiality), documentation standards, and quality checks.<\/li>\n<li><strong>Source and analytic rigor<\/strong>\n   &#8211; Ensure analytic integrity: structured analytic techniques, bias mitigation, source grading, and confidence statements; maintain auditability of key assessments.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Leadership responsibilities (Lead-level, not people-manager by default)<\/h3>\n\n\n\n<ol class=\"wp-block-list\" start=\"21\">\n<li><strong>Technical leadership and mentorship<\/strong>\n   &#8211; Mentor analysts or junior CTI specialists; set standards for analysis quality, production templates, and operational discipline.<\/li>\n<li><strong>Cross-team coordination<\/strong>\n   &#8211; Lead multi-stakeholder initiatives (e.g., \u201cTop 10 threats to our cloud\u201d program, detection gap closure sprint, threat intel integration rollouts).<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">4) Day-to-Day Activities<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Daily activities<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Triage incoming intelligence (vendor reports, OSINT, ISAC alerts, social channels, telemetry-derived signals) and assess relevance.<\/li>\n<li>Monitor priority threats and active campaigns impacting cloud\/SaaS\/identity\/software supply chain.<\/li>\n<li>Provide rapid-turn answers to SOC and IR questions (e.g., \u201cIs this domain part of a known campaign?\u201d \u201cWhat\u2019s the likely objective?\u201d).<\/li>\n<li>Enrich indicators and artifacts using internal telemetry and external sources; update confidence, severity, and applicability.<\/li>\n<li>Maintain TIP hygiene: deduplicate, score, tag, expire stale IOCs, and curate \u201cknown-good\u201d vs \u201cknown-bad.\u201d<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Weekly activities<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Publish a weekly intelligence summary tailored to internal audiences (SOC, IR, engineering security, leadership).<\/li>\n<li>Run a threat intel working session with detection engineering and threat hunting:<\/li>\n<li>Top campaigns and relevant TTPs<\/li>\n<li>Proposed hunts and detections<\/li>\n<li>Review of false positives and intel quality<\/li>\n<li>Update \u201cpriority intelligence requirements\u201d (PIRs) and collection plans.<\/li>\n<li>Conduct a deep dive on at least one adversary, malware family, or technique relevant to the company\u2019s stack (e.g., token theft, OAuth abuse, cloud IAM persistence).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Monthly or quarterly activities<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Produce a monthly threat landscape report and quarterly executive briefing:<\/li>\n<li>What changed, why it matters, and what we are doing about it<\/li>\n<li>Maintain ATT&amp;CK coverage and gaps view; propose quarterly detection improvement goals.<\/li>\n<li>Review and tune integrations (TIP \u2194 SIEM\/SOAR\/EDR), distribution rules, and indicator lifetimes.<\/li>\n<li>Support red\/purple team planning by providing adversary emulation recommendations and campaign playbooks.<\/li>\n<li>Conduct periodic vendor\/source reviews to improve signal-to-noise and cost effectiveness.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Recurring meetings or rituals<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SOC operations sync (often weekly)<\/li>\n<li>Incident response readiness sync \/ post-incident reviews (as needed; monthly cadence common)<\/li>\n<li>Vulnerability prioritization meeting (weekly\/bi-weekly)<\/li>\n<li>Cloud security posture meeting (bi-weekly\/monthly)<\/li>\n<li>Security leadership staff meeting input (monthly\/quarterly brief contribution)<\/li>\n<li>Detection engineering backlog grooming (weekly\/bi-weekly)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Incident, escalation, or emergency work<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Join incident bridges as intelligence lead when incidents involve:<\/li>\n<li>suspected APT activity<\/li>\n<li>ransomware\/extortion threats<\/li>\n<li>major phishing or identity compromise<\/li>\n<li>supply chain compromise indicators<\/li>\n<li>widespread exploitation (e.g., major CVE with active exploitation)<\/li>\n<li>Deliver time-sensitive products:<\/li>\n<li>\u201cWhat we know \/ what we don\u2019t know\u201d<\/li>\n<li>likely actor objectives and next moves<\/li>\n<li>infrastructure pivots and containment recommendations<\/li>\n<li>rapid detection and hunt queries to validate exposure<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">5) Key Deliverables<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Priority Intelligence Requirements (PIRs)<\/strong> and collection plan (with stakeholder sign-off and review cadence)<\/li>\n<li><strong>Weekly threat intelligence digest<\/strong> (operational audience)<\/li>\n<li><strong>Monthly threat landscape report<\/strong> (broader security audience)<\/li>\n<li><strong>Quarterly executive threat briefing<\/strong> (CISO\/VP Security, CIO, senior engineering leadership)<\/li>\n<li><strong>Threat actor \/ campaign dossiers<\/strong> (living documents)<\/li>\n<li><strong>Hunt packages<\/strong> (hypotheses, scope, queries, expected signals, triage guidance, closure criteria)<\/li>\n<li><strong>Detection enablement packages<\/strong><\/li>\n<li>ATT&amp;CK mapping<\/li>\n<li>query prototypes (SIEM\/EDR)<\/li>\n<li>recommended telemetry\/log sources<\/li>\n<li>validation steps and tuning notes<\/li>\n<li><strong>IOC curation and distribution rules<\/strong><\/li>\n<li>scoring model, TTL\/expiry policy, allowlist approach, confidence levels<\/li>\n<li><strong>Intel-to-control recommendations<\/strong><\/li>\n<li>prioritized mitigations aligned to campaigns and common techniques<\/li>\n<li><strong>Incident intelligence support artifacts<\/strong><\/li>\n<li>enrichment notes, pivot graphs, infrastructure analysis summaries<\/li>\n<li><strong>Threat intelligence program runbooks<\/strong><\/li>\n<li>workflow, SLAs, escalation paths, and quality checklist<\/li>\n<li><strong>Source evaluation and vendor performance review<\/strong><\/li>\n<li>signal-to-noise assessment, cost\/benefit, coverage analysis<\/li>\n<li><strong>Training and enablement content<\/strong><\/li>\n<li>CTI onboarding guide, analytic tradecraft tips, ATT&amp;CK mapping basics for non-CTI teams<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">6) Goals, Objectives, and Milestones<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">30-day goals (first month)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Understand the company\u2019s security operating model, incident history, and current detection\/response posture.<\/li>\n<li>Inventory intelligence sources, TIP\/SIEM\/SOAR\/EDR integrations, and key stakeholders.<\/li>\n<li>Establish initial PIRs and define \u201cwhat good looks like\u201d for intelligence consumers (SOC, IR, VM, Cloud Security, leadership).<\/li>\n<li>Deliver at least:<\/li>\n<li>1 rapid intelligence brief on a relevant campaign or exploitation trend<\/li>\n<li>1 detection\/hunt enablement package mapped to ATT&amp;CK<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">60-day goals<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implement an intelligence production cadence (weekly digest + monthly landscape report) with consistent templates and distribution.<\/li>\n<li>Improve operationalization:<\/li>\n<li>define IOC scoring and expiration policy<\/li>\n<li>refine TIP tags and confidence model<\/li>\n<li>implement feedback loop with SOC\/detection engineering<\/li>\n<li>Lead at least one cross-functional initiative:<\/li>\n<li>e.g., \u201cTop threats to identity and SaaS\u201d with prioritized mitigations and detection actions<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">90-day goals<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Demonstrate measurable impact:<\/li>\n<li>at least 3 detection rules or hunts shipped\/institutionalized that were driven by CTI<\/li>\n<li>improved alert quality (reduced false positives related to noisy feeds)<\/li>\n<li>Produce a first quarterly executive threat briefing:<\/li>\n<li>key threats, risk narrative, and actions taken\/needed<\/li>\n<li>Establish a repeatable incident-intel support workflow with IR (trigger criteria, SLAs, templates).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">6-month milestones<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mature CTI program operations:<\/li>\n<li>stable PIR lifecycle, source evaluation, quality metrics, stakeholder satisfaction check<\/li>\n<li>Build or mature ATT&amp;CK coverage view for the company\u2019s environment (including cloud and identity)<\/li>\n<li>Integrate intelligence more deeply with:<\/li>\n<li>vulnerability prioritization (KEV + exploitation trends)<\/li>\n<li>security architecture decisions (e.g., logging, segmentation, IAM policies)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">12-month objectives<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Become the recognized internal authority on relevant adversaries and campaign trends.<\/li>\n<li>Demonstrate consistent year-over-year improvements in:<\/li>\n<li>detection coverage for priority techniques<\/li>\n<li>incident response speed\/accuracy due to better context<\/li>\n<li>exposure reduction for actively exploited vulnerabilities<\/li>\n<li>Lead the CTI function\u2019s contribution to security strategy planning and budget cycles (feed selection, platform improvements, training).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Long-term impact goals (12\u201324+ months)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Institutionalize an intelligence-led security approach:<\/li>\n<li>threat-driven control validation<\/li>\n<li>routine adversary simulation alignment<\/li>\n<li>proactive risk narratives that influence engineering roadmaps<\/li>\n<li>Build scalable CTI operations that remain effective as the organization grows (more products, more cloud accounts, more regions).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Role success definition<\/h3>\n\n\n\n<p>The role is successful when intelligence is <strong>consistently used<\/strong> to drive decisions and defensive actions\u2014and when stakeholders can point to specific changes (detections, controls, prioritization) that happened because of CTI.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What high performance looks like<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Produces intelligence that is <strong>timely, relevant, and actionable<\/strong>, not just interesting.<\/li>\n<li>Operates with analytic rigor (confidence, sourcing, bias control) while meeting operational urgency.<\/li>\n<li>Measurably improves detection\/hunt outcomes and reduces noise from poor-quality indicators.<\/li>\n<li>Builds strong partnerships and trust; stakeholders actively seek CTI input.<\/li>\n<li>Anticipates leadership questions and delivers decision-grade narratives, not raw data dumps.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">7) KPIs and Productivity Metrics<\/h2>\n\n\n\n<p>The following measurement framework balances output volume with real-world outcomes. Targets vary by maturity, industry, and tooling; examples below assume a mid-to-large software\/IT organization with a SOC and detection engineering function.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">KPI table<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table>\n<thead>\n<tr>\n<th>Metric name<\/th>\n<th>What it measures<\/th>\n<th>Why it matters<\/th>\n<th>Example target \/ benchmark<\/th>\n<th>Frequency<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Intelligence products delivered (by type)<\/td>\n<td>Count of briefs, digests, dossiers, alerts, hunt packages, exec updates<\/td>\n<td>Ensures predictable CTI output and stakeholder coverage<\/td>\n<td>1 weekly digest; 1 monthly report; 1 quarterly exec brief; 2\u20134 hunt\/detection packages\/month<\/td>\n<td>Weekly\/Monthly<\/td>\n<\/tr>\n<tr>\n<td>Relevance rate (stakeholder-rated)<\/td>\n<td>% of products rated \u201cuseful\/actionable\u201d by consumers<\/td>\n<td>Validates that CTI is aligned to operational needs<\/td>\n<td>\u226580% \u201cuseful\/actionable\u201d<\/td>\n<td>Monthly\/Quarterly<\/td>\n<\/tr>\n<tr>\n<td>Time-to-triage (new critical intel)<\/td>\n<td>Time from receiving critical intel to initial relevance assessment and notification<\/td>\n<td>Supports rapid response to emerging threats<\/td>\n<td>&lt;4 hours for high severity items<\/td>\n<td>Weekly<\/td>\n<\/tr>\n<tr>\n<td>Intelligence-to-action conversion<\/td>\n<td># of CTI-driven actions (detections deployed, hunts executed, mitigations implemented)<\/td>\n<td>Measures real impact vs. reporting<\/td>\n<td>6\u201312 meaningful actions\/quarter (depends on size)<\/td>\n<td>Monthly\/Quarterly<\/td>\n<\/tr>\n<tr>\n<td>Detection coverage improvement (priority techniques)<\/td>\n<td>Change in coverage for top ATT&amp;CK techniques relevant to environment<\/td>\n<td>Connects CTI to security posture<\/td>\n<td>+10\u201320% coverage for priority techniques per quarter (maturity-dependent)<\/td>\n<td>Quarterly<\/td>\n<\/tr>\n<tr>\n<td>False positive reduction from intel feeds<\/td>\n<td>Reduction in noisy alerts attributable to poor-quality IOCs<\/td>\n<td>Prevents SOC fatigue and improves trust<\/td>\n<td>20\u201340% reduction after feed tuning<\/td>\n<td>Monthly<\/td>\n<\/tr>\n<tr>\n<td>Indicator quality score<\/td>\n<td>% of indicators with sufficient context, confidence, and TTL; low duplication<\/td>\n<td>Measures curation quality<\/td>\n<td>\u226590% of distributed IOCs have confidence, source, TTL, and context<\/td>\n<td>Monthly<\/td>\n<\/tr>\n<tr>\n<td>Incident intel support SLA attainment<\/td>\n<td>% of incident intel requests met within agreed time<\/td>\n<td>Ensures reliability during high pressure events<\/td>\n<td>\u226595% within SLA<\/td>\n<td>Monthly<\/td>\n<\/tr>\n<tr>\n<td>Exploited vulnerability prioritization accuracy<\/td>\n<td>% of \u201chigh priority\u201d vulnerability calls later confirmed relevant (exploited or probed)<\/td>\n<td>Improves patch prioritization<\/td>\n<td>\u226570% precision for \u201curgent\u201d calls (varies by environment)<\/td>\n<td>Quarterly<\/td>\n<\/tr>\n<tr>\n<td>Stakeholder adoption (subscription\/engagement)<\/td>\n<td>Attendance, reads, acknowledgements, requests following products<\/td>\n<td>Indicates reach and trust<\/td>\n<td>Increasing trend; stable key stakeholder participation<\/td>\n<td>Monthly<\/td>\n<\/tr>\n<tr>\n<td>Source effectiveness index<\/td>\n<td>Cost-to-value of sources (signal-to-noise, uniqueness, timeliness)<\/td>\n<td>Optimizes spend and analyst time<\/td>\n<td>Identify bottom 20% sources and remediate\/replace annually<\/td>\n<td>Quarterly\/Annually<\/td>\n<\/tr>\n<tr>\n<td>Threat hunting yield (intel-driven)<\/td>\n<td>Findings rate from intel-driven hunts (true positives, investigations)<\/td>\n<td>Measures operational relevance<\/td>\n<td>Baseline then improve; target depends on org (e.g., 1 meaningful finding\/month)<\/td>\n<td>Monthly<\/td>\n<\/tr>\n<tr>\n<td>Program documentation health<\/td>\n<td>Currency of PIRs, runbooks, templates, and knowledge base<\/td>\n<td>Reduces single points of failure<\/td>\n<td>\u226590% artifacts reviewed within last 6 months<\/td>\n<td>Quarterly<\/td>\n<\/tr>\n<tr>\n<td>Cross-functional cycle time<\/td>\n<td>Time from CTI recommendation to implemented mitigation (or formal decision)<\/td>\n<td>Tests whether CTI influences real change<\/td>\n<td>Reduce by 10\u201320% over 2 quarters<\/td>\n<td>Quarterly<\/td>\n<\/tr>\n<tr>\n<td>Mentorship\/enablement contributions (leadership)<\/td>\n<td>Trainings delivered, reviews performed, standards maintained<\/td>\n<td>Ensures scaling and quality<\/td>\n<td>1 training\/quarter; monthly review sessions<\/td>\n<td>Quarterly<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/figure>\n\n\n\n<p><strong>Notes on measurement:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Targets should be calibrated after baselining for 1\u20132 quarters.<\/li>\n<li>Outcome metrics (conversion, coverage improvement, incident SLA) should be weighted higher than pure output counts.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">8) Technical Skills Required<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Must-have technical skills<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Threat intelligence tradecraft (Critical)<\/strong>\n   &#8211; Description: Structured intelligence lifecycle, PIRs, collection\/processing, analytic standards, confidence levels, dissemination.\n   &#8211; Use: Producing decision-grade intelligence and operational packages.<\/li>\n<li><strong>MITRE ATT&amp;CK (Critical)<\/strong>\n   &#8211; Description: Mapping adversary behaviors to techniques and sub-techniques; communicating coverage gaps.\n   &#8211; Use: Detection enablement, hunt packages, executive reporting.<\/li>\n<li><strong>Indicator and artifact analysis (Critical)<\/strong>\n   &#8211; Description: Analyze domains, IPs, URLs, hashes, certificates; understand infrastructure patterns and reliability.\n   &#8211; Use: IOC curation, incident enrichment, feed tuning.<\/li>\n<li><strong>Incident support and investigative thinking (Critical)<\/strong>\n   &#8211; Description: Ability to pivot from limited signals, interpret attacker objectives, and support response decisions.\n   &#8211; Use: Major incident bridges, escalations, and rapid-turn intel.<\/li>\n<li><strong>SIEM\/EDR literacy (Critical)<\/strong>\n   &#8211; Description: Understanding of how telemetry is collected and queried; ability to propose queries and detections.\n   &#8211; Use: Translating threat behaviors into detection logic.<\/li>\n<li><strong>OSINT collection and assessment (Important)<\/strong>\n   &#8211; Description: Evaluate open-source reporting, social media claims, vendor blogs; validate and cross-source.\n   &#8211; Use: Early warning and campaign tracking.<\/li>\n<li><strong>Cloud and identity threat fundamentals (Important)<\/strong>\n   &#8211; Description: Common cloud attack paths and identity abuse patterns (token theft, OAuth abuse, IAM persistence).\n   &#8211; Use: Relevance assessment and prioritization in modern environments.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Good-to-have technical skills<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Threat Intelligence Platform (TIP) operation (Important)<\/strong>\n   &#8211; Use: IOC scoring, workflows, integrations, distribution management.<\/li>\n<li><strong>STIX\/TAXII and intel standards (Optional to Important)<\/strong>\n   &#8211; Use: Feed integration, structured sharing, interoperability (more important in mature programs).<\/li>\n<li><strong>SOAR workflows (Optional)<\/strong>\n   &#8211; Use: Automated enrichment and response; pushing intel into playbooks.<\/li>\n<li><strong>Malware analysis fundamentals (Optional)<\/strong>\n   &#8211; Use: Basic static\/dynamic analysis interpretation, sandbox output, TTP extraction.<\/li>\n<li><strong>Email and phishing analysis (Important in many orgs)<\/strong>\n   &#8211; Use: Header analysis, infrastructure mapping, credential harvesting patterns.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Advanced or expert-level technical skills<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Adversary emulation alignment (Important)<\/strong>\n   &#8211; Description: Translating CTI into emulation plans, test cases, and control validation.\n   &#8211; Use: Purple team exercises, security validation roadmaps.<\/li>\n<li><strong>Detection engineering collaboration depth (Important)<\/strong>\n   &#8211; Description: Ability to specify detection logic, required logs, expected false positive patterns, tuning steps.\n   &#8211; Use: High-impact enablement and faster operationalization.<\/li>\n<li><strong>Analytic rigor and structured analytic techniques (Critical at lead level)<\/strong>\n   &#8211; Description: Bias mitigation, hypothesis testing, alternative analysis, confidence calibration.\n   &#8211; Use: High-stakes assessments, executive briefs, incident attribution considerations.<\/li>\n<li><strong>Graph\/link analysis (Optional but valuable)<\/strong>\n   &#8211; Description: Mapping infrastructure relationships across domains, certificates, IP ranges, hosting providers.\n   &#8211; Use: Campaign tracking and infrastructure takedown support.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Emerging future skills for this role (next 2\u20135 years)<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>AI-augmented intelligence analysis and validation (Important)<\/strong>\n   &#8211; Use: Summarization, clustering, relationship extraction\u2014paired with human validation and source control.<\/li>\n<li><strong>Cloud-native threat intelligence (Critical and growing)<\/strong>\n   &#8211; Use: Deep familiarity with cloud control plane logs, SaaS audit logs, identity provider telemetry, and cloud attacker tradecraft.<\/li>\n<li><strong>Software supply chain threat intelligence (Important)<\/strong>\n   &#8211; Use: Tracking ecosystem-level risks (dependency confusion, CI\/CD compromise patterns, signing key theft).<\/li>\n<li><strong>Exposure management integration (Important)<\/strong>\n   &#8211; Use: Combining intel with asset context and exposure paths to prioritize mitigations and monitoring.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">9) Soft Skills and Behavioral Capabilities<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>\n<p><strong>Analytical judgment and intellectual honesty<\/strong>\n   &#8211; Why it matters: CTI decisions influence incident response, executive risk posture, and resource allocation.\n   &#8211; On the job: Uses evidence-based reasoning, states assumptions, and expresses confidence appropriately.\n   &#8211; Strong performance: Produces clear \u201cwhat we know \/ what we assess \/ what we don\u2019t know\u201d statements and updates assessments as evidence changes.<\/p>\n<\/li>\n<li>\n<p><strong>Executive communication and narrative building<\/strong>\n   &#8211; Why it matters: Leaders need decisions, not data floods.\n   &#8211; On the job: Converts technical threat details into business impact, likelihood, and recommended actions.\n   &#8211; Strong performance: Delivers concise briefings with crisp calls-to-action and avoids jargon unless needed.<\/p>\n<\/li>\n<li>\n<p><strong>Operational empathy for SOC\/IR<\/strong>\n   &#8211; Why it matters: CTI must be usable under pressure.\n   &#8211; On the job: Provides detections and hunt guidance that match how analysts work, including triage tips and false positive expectations.\n   &#8211; Strong performance: SOC analysts report that CTI makes them faster and more confident.<\/p>\n<\/li>\n<li>\n<p><strong>Stakeholder management and influence without authority<\/strong>\n   &#8211; Why it matters: CTI impact depends on engineering and security teams implementing changes.\n   &#8211; On the job: Builds alignment, negotiates priorities, and tracks follow-through.\n   &#8211; Strong performance: Consistently turns intelligence into shipped improvements across multiple teams.<\/p>\n<\/li>\n<li>\n<p><strong>Curiosity with discipline<\/strong>\n   &#8211; Why it matters: Threat landscapes are noisy; curiosity must be directed by PIRs.\n   &#8211; On the job: Investigates new claims and anomalies but ties work back to priorities.\n   &#8211; Strong performance: Maintains focus on relevant threats while still catching emerging risks early.<\/p>\n<\/li>\n<li>\n<p><strong>Calm under uncertainty<\/strong>\n   &#8211; Why it matters: Incidents and emerging exploits can evolve quickly with incomplete data.\n   &#8211; On the job: Works methodically, avoids speculation, and provides useful interim guidance.\n   &#8211; Strong performance: Becomes a stabilizing force during escalations.<\/p>\n<\/li>\n<li>\n<p><strong>Documentation and knowledge sharing<\/strong>\n   &#8211; Why it matters: CTI programs fail when knowledge is trapped in individuals.\n   &#8211; On the job: Writes durable dossiers, runbooks, and structured outputs.\n   &#8211; Strong performance: Others can execute core workflows using documented standards.<\/p>\n<\/li>\n<li>\n<p><strong>Mentorship and quality leadership (Lead-level)<\/strong>\n   &#8211; Why it matters: Lead roles set the bar for analytic tradecraft and program consistency.\n   &#8211; On the job: Reviews outputs, coaches analysis techniques, and sets templates and standards.\n   &#8211; Strong performance: Team output quality improves and stakeholders experience a consistent \u201cCTI brand.\u201d<\/p>\n<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">10) Tools, Platforms, and Software<\/h2>\n\n\n\n<p>Tools vary by company maturity and vendor preferences. Items below reflect common enterprise patterns for threat intelligence in software\/IT environments.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table>\n<thead>\n<tr>\n<th>Category<\/th>\n<th>Tool, platform, or software<\/th>\n<th>Primary use<\/th>\n<th>Common \/ Optional \/ Context-specific<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Security (TIP)<\/td>\n<td>Threat Intelligence Platform (e.g., MISP; OpenCTI; Anomali; ThreatConnect; Recorded Future Intelligence Cloud)<\/td>\n<td>Ingest, curate, score, tag, distribute intelligence; manage workflows<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>Security (SIEM)<\/td>\n<td>SIEM (e.g., Splunk; Microsoft Sentinel; Google SecOps\/Chronicle; QRadar)<\/td>\n<td>Query telemetry, validate IOCs\/TTPs, support detections and hunting<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>Security (EDR\/XDR)<\/td>\n<td>EDR\/XDR (e.g., CrowdStrike; Microsoft Defender for Endpoint; SentinelOne; Cortex XDR)<\/td>\n<td>Endpoint hunting, detections, IOC matching, investigation context<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>Security (SOAR)<\/td>\n<td>SOAR (e.g., Cortex XSOAR; Splunk SOAR; Sentinel playbooks)<\/td>\n<td>Automate enrichment, triage, and response actions<\/td>\n<td>Optional<\/td>\n<\/tr>\n<tr>\n<td>Security (Network)<\/td>\n<td>NDR \/ network analytics (vendor-dependent)<\/td>\n<td>Detect lateral movement, C2 patterns, unusual traffic<\/td>\n<td>Context-specific<\/td>\n<\/tr>\n<tr>\n<td>Security (Email)<\/td>\n<td>Secure email gateway \/ phishing tools (vendor-dependent)<\/td>\n<td>Phishing analysis, campaign clustering, user-reported phish triage<\/td>\n<td>Context-specific<\/td>\n<\/tr>\n<tr>\n<td>OSINT \/ Enrichment<\/td>\n<td>VirusTotal<\/td>\n<td>File\/URL reputation, relationships, passive intel<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>OSINT \/ Enrichment<\/td>\n<td>Passive DNS providers (vendor-dependent)<\/td>\n<td>Domain\/IP history and pivots<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>OSINT \/ Enrichment<\/td>\n<td>WHOIS \/ RDAP tools<\/td>\n<td>Registration pivots and attribution clues<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>OSINT \/ Enrichment<\/td>\n<td>Certificate transparency search (e.g., crt.sh)<\/td>\n<td>Discover related infrastructure via certs<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>OSINT \/ Enrichment<\/td>\n<td>URL scanning \/ sandboxing (vendor-dependent)<\/td>\n<td>Detonation and behavioral extraction<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>Detection Engineering<\/td>\n<td>Sigma (rule format)<\/td>\n<td>Portable detection logic to share with detection engineers<\/td>\n<td>Optional<\/td>\n<\/tr>\n<tr>\n<td>Detection Engineering<\/td>\n<td>YARA<\/td>\n<td>Malware pattern matching and triage<\/td>\n<td>Optional<\/td>\n<\/tr>\n<tr>\n<td>Threat Frameworks<\/td>\n<td>MITRE ATT&amp;CK Navigator<\/td>\n<td>Coverage mapping and communication<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>Data \/ Analytics<\/td>\n<td>Python<\/td>\n<td>Automation, enrichment, parsing, analysis<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>Data \/ Analytics<\/td>\n<td>Jupyter \/ notebooks<\/td>\n<td>Exploratory analysis and repeatable workflows<\/td>\n<td>Optional<\/td>\n<\/tr>\n<tr>\n<td>Data \/ Analytics<\/td>\n<td>SQL<\/td>\n<td>Querying data lakes \/ security datasets<\/td>\n<td>Optional to Common<\/td>\n<\/tr>\n<tr>\n<td>Cloud platforms<\/td>\n<td>AWS \/ Azure \/ GCP<\/td>\n<td>Understanding cloud logs, attacker paths, and control plane events<\/td>\n<td>Context-specific (depends on cloud)<\/td>\n<\/tr>\n<tr>\n<td>Identity<\/td>\n<td>Identity provider tooling (e.g., Entra ID\/Azure AD; Okta)<\/td>\n<td>Investigate identity abuse and session\/token anomalies<\/td>\n<td>Common in many orgs<\/td>\n<\/tr>\n<tr>\n<td>Collaboration<\/td>\n<td>Slack \/ Microsoft Teams<\/td>\n<td>Rapid dissemination, incident collaboration<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>Documentation<\/td>\n<td>Confluence \/ Notion \/ SharePoint<\/td>\n<td>Knowledge base, dossiers, runbooks<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>Ticketing \/ ITSM<\/td>\n<td>ServiceNow \/ Jira<\/td>\n<td>Intake, tracking, workflow integration<\/td>\n<td>Common<\/td>\n<\/tr>\n<tr>\n<td>Source control<\/td>\n<td>GitHub \/ GitLab<\/td>\n<td>Store queries, detection prototypes, scripts<\/td>\n<td>Optional to Common<\/td>\n<\/tr>\n<tr>\n<td>Visualization<\/td>\n<td>Link analysis tools (vendor-dependent)<\/td>\n<td>Infrastructure graphs and relationship mapping<\/td>\n<td>Optional<\/td>\n<\/tr>\n<tr>\n<td>External sharing<\/td>\n<td>ISAC \/ ISAOs, vendor portals<\/td>\n<td>Receive\/share intel with community<\/td>\n<td>Context-specific<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">11) Typical Tech Stack \/ Environment<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Infrastructure environment<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cloud-first or hybrid enterprise environment:<\/li>\n<li>One or more major cloud providers (AWS\/Azure\/GCP)<\/li>\n<li>Multi-account\/subscription structure<\/li>\n<li>Centralized logging pipeline into SIEM\/data lake<\/li>\n<li>SaaS-heavy corporate stack (identity provider, endpoint management, collaboration tools)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Application environment<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Internet-facing services, APIs, and web applications<\/li>\n<li>Containerized workloads (Kubernetes) and\/or managed PaaS<\/li>\n<li>CI\/CD pipelines (GitHub Actions, GitLab CI, Azure DevOps, etc.) and artifact registries<\/li>\n<li>Customer environments may be relevant if the company provides managed services or B2B SaaS with deep integrations<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Data environment<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security telemetry sources:<\/li>\n<li>cloud audit logs (e.g., CloudTrail \/ Activity Logs)<\/li>\n<li>identity logs (sign-ins, token events, risky sign-ins)<\/li>\n<li>endpoint telemetry<\/li>\n<li>application logs (auth events, API gateway logs)<\/li>\n<li>DNS\/proxy logs (where available)<\/li>\n<li>A central SIEM plus possible security data lake for high-volume logs<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Security environment<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SOC function with triage and escalation<\/li>\n<li>Detection engineering (centralized or embedded)<\/li>\n<li>Incident response playbooks and an on-call model<\/li>\n<li>Vulnerability management and patching governance<\/li>\n<li>Threat modeling and security architecture practices (varies by maturity)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Delivery model<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Agile or hybrid agile; security work typically managed via Jira\/ServiceNow<\/li>\n<li>CTI outputs delivered via:<\/li>\n<li>scheduled reports<\/li>\n<li>alert-style notifications for urgent items<\/li>\n<li>tickets\/user stories for detection and mitigation work<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Scale or complexity context<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mid-to-large environment: multiple engineering teams, distributed services, large identity footprint<\/li>\n<li>High noise environment where <strong>curation and prioritization<\/strong> are essential to prevent alert fatigue<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Team topology<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Lead Threat Intelligence Specialist usually sits within:<\/li>\n<li>Security Operations (SOC umbrella), or<\/li>\n<li>a dedicated Threat Intelligence team, or<\/li>\n<li>a Detection &amp; Response organization<\/li>\n<li>Close working relationships with:<\/li>\n<li>Detection Engineering, Threat Hunting, IR, Cloud Security, AppSec<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">12) Stakeholders and Collaboration Map<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Internal stakeholders<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SOC Analysts \/ Security Operations<\/strong><\/li>\n<li>Collaboration: provide actionable intel, IOC tuning guidance, incident context, and rapid assessments.<\/li>\n<li>Output consumers: daily\/weekly intelligence, urgent alerts, enrichment notes.<\/li>\n<li><strong>Detection Engineering<\/strong><\/li>\n<li>Collaboration: convert TTPs into detections; iterate on logic and reduce false positives.<\/li>\n<li>Output consumers: detection packages, ATT&amp;CK mapping, telemetry requirements.<\/li>\n<li><strong>Threat Hunting<\/strong><\/li>\n<li>Collaboration: develop hypotheses, run hunts, interpret outcomes, refine future hunts.<\/li>\n<li><strong>Incident Response (IR) \/ DFIR<\/strong><\/li>\n<li>Collaboration: actor\/campaign assessment, infrastructure pivots, likely objectives and next steps, scoping support.<\/li>\n<li><strong>Vulnerability Management<\/strong><\/li>\n<li>Collaboration: exploitation-aware prioritization, KEV alignment, \u201cweaponization watch\u201d insights.<\/li>\n<li><strong>Cloud Security<\/strong><\/li>\n<li>Collaboration: cloud attack-path intelligence, identity abuse intelligence, logging and control recommendations.<\/li>\n<li><strong>AppSec \/ Product Security<\/strong><\/li>\n<li>Collaboration: software supply chain threat trends, vulnerability exploitation patterns, attacker focus areas.<\/li>\n<li><strong>GRC \/ Risk<\/strong><\/li>\n<li>Collaboration: threat landscape input for risk registers, control narratives, audits (without over-classifying or over-claiming).<\/li>\n<li><strong>Security Leadership (CISO\/VP Security\/Director SecOps)<\/strong><\/li>\n<li>Collaboration: executive reporting, prioritization, investment recommendations.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">External stakeholders (as applicable)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Vendors and intelligence providers<\/strong><\/li>\n<li>Source validation, coverage discussions, escalation of time-sensitive intel.<\/li>\n<li><strong>ISACs\/industry groups<\/strong><\/li>\n<li>Receive and share intelligence (where permitted).<\/li>\n<li><strong>Law enforcement \/ incident response partners<\/strong><\/li>\n<li>Typically coordinated via legal and IR leadership; provide intel when appropriate.<\/li>\n<li><strong>Customers (select cases)<\/strong><\/li>\n<li>For customer-facing incidents or trust communications, usually mediated through security leadership and communications teams.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Peer roles<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Lead Detection Engineer<\/li>\n<li>Threat Hunter (Senior\/Lead)<\/li>\n<li>Incident Response Lead<\/li>\n<li>Cloud Security Lead<\/li>\n<li>Vulnerability Management Lead<\/li>\n<li>Security Architect (enterprise\/cloud)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Upstream dependencies<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reliable telemetry\/logging pipelines<\/li>\n<li>Vendor feeds and OSINT sources<\/li>\n<li>Asset inventory \/ CMDB context (to assess relevance)<\/li>\n<li>Established incident management process<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Downstream consumers<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SOC and IR teams (operational action)<\/li>\n<li>Engineering teams (mitigations and product hardening)<\/li>\n<li>Leadership (risk decisions and resourcing)<\/li>\n<li>Compliance and risk teams (risk narratives)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Nature of collaboration<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CTI is most effective as a <strong>service with feedback loops<\/strong>:<\/li>\n<li>consumers provide feedback on usefulness<\/li>\n<li>CTI adjusts PIRs and products accordingly<\/li>\n<li>Expect high collaboration intensity during:<\/li>\n<li>major vulnerability events<\/li>\n<li>active exploitation waves<\/li>\n<li>incidents involving identity compromise or ransomware\/extortion<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Typical decision-making authority<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Owns CTI assessments, confidence statements, and product content.<\/li>\n<li>Recommends prioritization for security work; engineering and security leaders approve implementation priorities.<\/li>\n<li>Escalation point for intelligence disputes, source credibility, and high-risk threat calls.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Escalation points<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Escalate to Director of SecOps \/ Head of Detection &amp; Response for:<\/li>\n<li>high-impact threat advisories requiring major operational change<\/li>\n<li>requests for emergency patching\/hardening<\/li>\n<li>executive communications and customer-facing statements<\/li>\n<li>Escalate to Legal\/Privacy (via leadership) for:<\/li>\n<li>external sharing considerations<\/li>\n<li>sensitive attribution claims<\/li>\n<li>takedown actions or law enforcement engagement<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">13) Decision Rights and Scope of Authority<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Can decide independently<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Intelligence product content, format, and dissemination methods (within policy).<\/li>\n<li>Confidence levels, source grading, and analytic judgments (with documentation).<\/li>\n<li>IOC curation decisions (tagging, TTL, confidence, relevance) within agreed governance.<\/li>\n<li>Day-to-day collection choices and triage prioritization aligned to PIRs.<\/li>\n<li>Recommendations for detections\/hunts and technical pivots during incidents.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Requires team approval (Security Ops \/ Detection &amp; Response)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Changes to SOC workflows that affect staffing or on-call procedures.<\/li>\n<li>New operational processes impacting incident response playbooks.<\/li>\n<li>Material changes to detection strategy or high-volume ingestion that affects SIEM cost\/performance.<\/li>\n<li>Standardization decisions that affect multiple teams (templates, taxonomy, severity definitions).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Requires manager\/director\/executive approval<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Budget decisions (new intel vendors, major tooling upgrades, new data sources with significant cost).<\/li>\n<li>Public\/external communications regarding threats or attribution.<\/li>\n<li>Formal risk acceptance decisions when mitigations are deferred.<\/li>\n<li>Staffing\/hiring decisions (unless the role is explicitly given hiring authority).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Budget, architecture, vendor, delivery, hiring, compliance authority<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Budget:<\/strong> typically recommends; director\/VP approves.<\/li>\n<li><strong>Architecture:<\/strong> influences security architecture through threat-driven requirements; does not usually own architecture sign-off.<\/li>\n<li><strong>Vendor:<\/strong> leads evaluations and performance reviews; procurement approval remains with leadership.<\/li>\n<li><strong>Delivery:<\/strong> can own CTI deliverables end-to-end; implementation work is delivered by detection\/engineering teams.<\/li>\n<li><strong>Hiring:<\/strong> participates heavily in interviews; final decisions often with hiring manager.<\/li>\n<li><strong>Compliance:<\/strong> ensures intelligence handling meets policy (TLP, confidentiality); compliance interpretation remains with GRC\/legal.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">14) Required Experience and Qualifications<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Typical years of experience<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Common range: <strong>7\u201312+ years<\/strong> in cybersecurity with a strong emphasis on threat intelligence, detection\/response, or security investigations.<\/li>\n<li>Lead-level expectations include demonstrated impact across multiple teams, not just producing reports.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Education expectations<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bachelor\u2019s degree in cybersecurity, computer science, information systems, or related field is common.<\/li>\n<li>Equivalent experience is often acceptable, especially with strong practitioner background.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Certifications (Common \/ Optional \/ Context-specific)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Common \/ valued<\/strong><\/li>\n<li>GIAC: <strong>GCTI<\/strong> (Cyber Threat Intelligence), <strong>GCIA<\/strong> (Intrusion Analyst), <strong>GCIH<\/strong> (Incident Handler)<\/li>\n<li><strong>CISSP<\/strong> (broad security leadership credibility)<\/li>\n<li><strong>Optional \/ context-specific<\/strong><\/li>\n<li><strong>OSCP<\/strong> (valuable for exploitation understanding; not required for CTI)<\/li>\n<li>Cloud security certs (AWS\/Azure\/GCP) if the environment is cloud-heavy<\/li>\n<li>Vendor-specific SIEM\/EDR certs (useful but not mandatory)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Prior role backgrounds commonly seen<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Threat Intelligence Analyst \/ Senior CTI Analyst<\/li>\n<li>SOC Analyst (Tier 2\/3) with strong investigation skills<\/li>\n<li>Detection Engineer \/ Threat Hunter<\/li>\n<li>Incident Response Analyst \/ DFIR consultant<\/li>\n<li>Security Researcher (with strong operational mindset)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Domain knowledge expectations<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Strong knowledge of:<\/li>\n<li>attacker tradecraft (phishing, malware delivery, credential theft, persistence)<\/li>\n<li>cloud and identity attack patterns (increasingly essential)<\/li>\n<li>vulnerability exploitation lifecycle and weaponization patterns<\/li>\n<li>security telemetry and detection constraints (what is feasible to detect and how)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Leadership experience expectations (Lead-level)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Demonstrated ability to:<\/li>\n<li>mentor and raise quality standards for others<\/li>\n<li>lead cross-functional initiatives without direct authority<\/li>\n<li>communicate with executives and drive decisions\/actions<\/li>\n<li>People management experience is <strong>not required<\/strong> unless explicitly defined as a team lead manager role.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">15) Career Path and Progression<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Common feeder roles into this role<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Senior Threat Intelligence Analyst<\/li>\n<li>Senior SOC Analyst \/ SOC Team Lead (investigations-heavy)<\/li>\n<li>Senior Threat Hunter<\/li>\n<li>Detection Engineer (with strong intel inclination)<\/li>\n<li>IR\/DFIR Analyst with strong reporting and stakeholder skills<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Next likely roles after this role<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Principal Threat Intelligence Specialist<\/strong> \/ Staff CTI (broader scope, more strategy, more cross-org influence)<\/li>\n<li><strong>Threat Intelligence Manager<\/strong> (if moving into people leadership and program ownership)<\/li>\n<li><strong>Head of Threat Intelligence<\/strong> (in larger orgs)<\/li>\n<li><strong>Detection &amp; Response Lead<\/strong> (broader operational ownership)<\/li>\n<li><strong>Security Strategy \/ Security Architecture (threat-informed)<\/strong> roles<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Adjacent career paths<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Detection Engineering \/ Security Analytics<\/strong><\/li>\n<li><strong>Threat Hunting leadership<\/strong><\/li>\n<li><strong>Incident Response leadership<\/strong><\/li>\n<li><strong>Cloud Security \/ Identity Security specialization<\/strong><\/li>\n<li><strong>Security Product Management<\/strong> (building security capabilities and platforms)<\/li>\n<li><strong>Security Research<\/strong> (more external-facing, if desired)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Skills needed for promotion (Lead \u2192 Principal\/Staff)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Demonstrated sustained outcomes:<\/li>\n<li>detection coverage improvements<\/li>\n<li>incident response acceleration due to CTI<\/li>\n<li>measurable reduction of risk\/exposure tied to active threats<\/li>\n<li>Greater strategic capability:<\/li>\n<li>multi-quarter planning<\/li>\n<li>executive persuasion<\/li>\n<li>cross-business influence<\/li>\n<li>Ability to scale CTI via:<\/li>\n<li>automation<\/li>\n<li>training<\/li>\n<li>standardized processes and governance<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">How this role evolves over time<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Early phase: establish trust, relevance, and operational cadence.<\/li>\n<li>Mid phase: deepen integrations (TIP\/SIEM\/SOAR), mature metrics, strengthen ATT&amp;CK coverage and detection alignment.<\/li>\n<li>Mature phase: become strategic advisor to leadership; institutionalize intelligence-led defense and guide investment priorities.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">16) Risks, Challenges, and Failure Modes<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Common role challenges<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Signal-to-noise overload:<\/strong> too many feeds, too many reports, too little relevance.<\/li>\n<li><strong>Lack of asset and business context:<\/strong> difficulty determining whether intel applies to your environment.<\/li>\n<li><strong>Operationalization gap:<\/strong> intel is produced but not converted into detections, hunts, or mitigations.<\/li>\n<li><strong>Stakeholder mismatch:<\/strong> executives want risk narratives; SOC wants quick pivots; engineering wants clear requirements.<\/li>\n<li><strong>Attribution pressure:<\/strong> stakeholders may push for definitive attribution when evidence is insufficient.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Bottlenecks<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Limited detection engineering bandwidth to implement CTI-driven requests.<\/li>\n<li>Incomplete telemetry (missing logs, short retention, limited visibility in SaaS\/cloud).<\/li>\n<li>TIP\/SIEM integration complexity and cost constraints.<\/li>\n<li>Slow change management for control improvements (IAM, hardening, logging).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Anti-patterns<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201cIOC dumping\u201d without context, confidence, or expiry.<\/li>\n<li>Producing long reports that no one reads; low operational value.<\/li>\n<li>Treating CTI as purely external news rather than integrating internal telemetry and incidents.<\/li>\n<li>Overconfidence and speculative assessments presented as facts.<\/li>\n<li>Failure to close feedback loops (not learning whether intel was useful).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Common reasons for underperformance<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Weak stakeholder engagement; PIRs not defined or not updated.<\/li>\n<li>Lack of pragmatic understanding of SOC workflows and detection realities.<\/li>\n<li>Poor analytical rigor; inconsistent confidence language.<\/li>\n<li>Over-indexing on tools\/vendors rather than outcomes.<\/li>\n<li>Not prioritizing: pursuing interesting but irrelevant threats.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Business risks if this role is ineffective<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Slower response to emerging exploitation waves, leading to preventable incidents.<\/li>\n<li>Wasted security spend on irrelevant threats or low-value feeds.<\/li>\n<li>Increased SOC noise and burnout due to poor IOC hygiene.<\/li>\n<li>Poor executive decisions due to unclear or misleading risk narratives.<\/li>\n<li>Failure to anticipate attacker focus areas (identity\/cloud\/supply chain), increasing exposure.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">17) Role Variants<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">By company size<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Startup \/ small company<\/strong><\/li>\n<li>Scope: broader; CTI may be part-time alongside IR\/SOC duties.<\/li>\n<li>Emphasis: pragmatic prioritization, lightweight tooling, direct support to engineering.<\/li>\n<li>Constraints: limited budget for premium intel feeds and TIPs.<\/li>\n<li><strong>Mid-size company<\/strong><\/li>\n<li>Scope: dedicated CTI capability with strong operationalization focus.<\/li>\n<li>Emphasis: building repeatable cadence, integrating with SIEM\/EDR, improving detection coverage.<\/li>\n<li><strong>Large enterprise<\/strong><\/li>\n<li>Scope: specialized CTI teams (strategic intel vs tactical intel vs vulnerability\/exploitation intel).<\/li>\n<li>Emphasis: governance, structured sharing, segmentation by business unit\/region, formal PIR management.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">By industry<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SaaS \/ software<\/strong><\/li>\n<li>Emphasis: identity abuse, cloud control plane, API abuse, supply chain threats, customer trust communications.<\/li>\n<li><strong>Financial services \/ payments<\/strong><\/li>\n<li>Emphasis: fraud-adjacent intel, phishing, account takeover, regulatory reporting expectations.<\/li>\n<li><strong>Healthcare<\/strong><\/li>\n<li>Emphasis: ransomware\/extortion trends, third-party risk, legacy infrastructure constraints.<\/li>\n<li><strong>Government \/ defense<\/strong><\/li>\n<li>Emphasis: formal intelligence standards, classification handling, structured dissemination.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">By geography<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regional variations are typically driven by:<\/li>\n<li>data handling laws and privacy constraints<\/li>\n<li>local threat landscape (regional actor focus)<\/li>\n<li>language requirements for OSINT monitoring<\/li>\n<li>Global orgs may require:<\/li>\n<li>multi-region briefings<\/li>\n<li>follow-the-sun dissemination<\/li>\n<li>localized response guidance<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Product-led vs service-led company<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Product-led (SaaS)<\/strong><\/li>\n<li>CTI must influence product security, secure SDLC, and cloud platform hardening.<\/li>\n<li>Greater need for exec\/customer communications inputs.<\/li>\n<li><strong>Service-led (MSP\/MSSP\/IT services)<\/strong><\/li>\n<li>CTI may include client-sector reporting, threat briefings for customers, and tailored intelligence by client profile.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Startup vs enterprise<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Startup:<\/strong> \u201cminimum viable CTI\u201d focused on top 5 threats, essential telemetry, and rapid operationalization.<\/li>\n<li><strong>Enterprise:<\/strong> formal CTI program with PIR governance, multiple intel products, and tighter compliance controls.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Regulated vs non-regulated<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Regulated:<\/strong> stronger requirements around documentation, auditability, and controlled sharing (TLP, retention, evidence handling).<\/li>\n<li><strong>Non-regulated:<\/strong> more flexibility, but still needs internal governance to avoid misstatements and unsafe sharing.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">18) AI \/ Automation Impact on the Role<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Tasks that can be automated (or heavily assisted)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ingestion, deduplication, and tagging<\/strong> of indicators and reports (TIP automation).<\/li>\n<li><strong>Initial summarization<\/strong> of long-form reporting, with citations back to sources.<\/li>\n<li><strong>Enrichment<\/strong> (passive DNS, WHOIS, sandbox lookups, reputation queries).<\/li>\n<li><strong>Clustering and relationship suggestions<\/strong> (campaign grouping, infrastructure linking).<\/li>\n<li><strong>Drafting detection query prototypes<\/strong> (with human validation and environment-specific adjustments).<\/li>\n<li><strong>Alerting on emerging CVEs\/exploitation<\/strong> with automated correlation to asset inventory and exposure signals.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Tasks that remain human-critical<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Relevance judgment<\/strong>: deciding what matters to the business based on architecture, exposure, and threat model.<\/li>\n<li><strong>Analytic integrity<\/strong>: confidence calibration, source credibility assessment, bias control, and avoiding over-claiming.<\/li>\n<li><strong>Stakeholder influence<\/strong>: persuading engineering and leadership to act, prioritizing tradeoffs, and coordinating response.<\/li>\n<li><strong>High-stakes incident support<\/strong>: real-time interpretation, pivot decisions, and narrative clarity under uncertainty.<\/li>\n<li><strong>Ethical and legal judgment<\/strong>: safe sharing, privacy considerations, and attribution restraint.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">How AI changes the role over the next 2\u20135 years<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The role shifts further from \u201creading and summarizing\u201d to <strong>curation, validation, and operationalization<\/strong>:<\/li>\n<li>CTI professionals become editors and decision-makers over AI-assisted pipelines.<\/li>\n<li>Greater expectations to measure impact:<\/li>\n<li>intelligence-to-action conversion, detection coverage, and exposure reduction become standard metrics.<\/li>\n<li>Increased integration with exposure management and control validation platforms:<\/li>\n<li>intelligence will drive continuous verification rather than periodic reporting.<\/li>\n<li>Higher premium on cross-domain expertise:<\/li>\n<li>cloud + identity + software supply chain knowledge becomes baseline for senior CTI roles.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">New expectations caused by AI, automation, or platform shifts<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ability to design <strong>guardrails<\/strong> for AI-assisted intel (source citation, hallucination detection, confidence control).<\/li>\n<li>Stronger data literacy:<\/li>\n<li>knowing how models transform data and where they introduce errors.<\/li>\n<li>Programmatic workflows:<\/li>\n<li>scripts, repeatable enrichment, and pipeline thinking become more expected at lead level.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">19) Hiring Evaluation Criteria<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">What to assess in interviews<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat intelligence tradecraft<\/strong><\/li>\n<li>Can the candidate define PIRs, collection requirements, and produce actionable outputs?<\/li>\n<li><strong>Analytical rigor<\/strong><\/li>\n<li>How they handle uncertainty, confidence statements, and conflicting sources.<\/li>\n<li><strong>Operationalization mindset<\/strong><\/li>\n<li>Evidence that their intelligence led to detections, hunts, mitigations, or response improvements.<\/li>\n<li><strong>Technical fluency<\/strong><\/li>\n<li>SIEM\/EDR query thinking, ATT&amp;CK mapping ability, and comfort with enrichment workflows.<\/li>\n<li><strong>Stakeholder communication<\/strong><\/li>\n<li>Ability to tailor message to SOC vs engineering vs executives.<\/li>\n<li><strong>Leadership as a lead IC<\/strong><\/li>\n<li>Mentoring, standards-setting, and cross-functional influence.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Practical exercises or case studies (recommended)<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>CTI-to-detection case study (90 minutes)<\/strong>\n   &#8211; Provide a short threat report and a simplified environment description (cloud + identity + endpoint).\n   &#8211; Ask the candidate to deliver:<ul>\n<li>relevance assessment and top risks<\/li>\n<li>ATT&amp;CK mapping of 5\u201310 key techniques<\/li>\n<li>3 detection\/hunt ideas with required telemetry<\/li>\n<li>IOC handling approach (confidence + TTL)<\/li>\n<\/ul>\n<\/li>\n<li><strong>Incident intel support scenario (45 minutes)<\/strong>\n   &#8211; Provide a simulated incident: suspicious OAuth app, token theft indicators, and suspicious IPs.\n   &#8211; Ask for:<ul>\n<li>immediate pivots and enrichment plan<\/li>\n<li>what to tell IR now vs later<\/li>\n<li>containment\/detection recommendations<\/li>\n<\/ul>\n<\/li>\n<li><strong>Executive brief writing sample (take-home or live outline)<\/strong>\n   &#8211; One-page brief: \u201cWhat changed this month, why it matters, what we are doing.\u201d<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Strong candidate signals<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Demonstrates a tight connection between intelligence and action (detections shipped, hunts executed, mitigations prioritized).<\/li>\n<li>Communicates with clarity and restraint; uses confidence language appropriately.<\/li>\n<li>Understands cloud and identity threats beyond generic endpoint malware narratives.<\/li>\n<li>Shows evidence of managing feed quality and reducing noise.<\/li>\n<li>Uses structured analytic techniques and documents assumptions.<\/li>\n<li>Comfortable collaborating with engineers; can describe telemetry requirements and constraints.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Weak candidate signals<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Focuses primarily on producing reports without examples of operational impact.<\/li>\n<li>Over-relies on tools or vendors as a substitute for analysis.<\/li>\n<li>Treats IOCs as universally useful without context, TTL, or false positive considerations.<\/li>\n<li>Cannot explain how they decide relevance to a specific environment.<\/li>\n<li>Struggles to tailor communication to different stakeholders.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Red flags<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Overconfident attribution claims without evidence.<\/li>\n<li>Disregard for information handling (TLP, sensitive sources, customer confidentiality).<\/li>\n<li>Dismissive attitude toward SOC workflows or engineering constraints.<\/li>\n<li>Inability to explain analytic reasoning step-by-step.<\/li>\n<li>History of generating noise (mass IOC pushes) that degraded SOC operations.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Scorecard dimensions (with weighting guidance)<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table>\n<thead>\n<tr>\n<th>Dimension<\/th>\n<th>What \u201cmeets bar\u201d looks like<\/th>\n<th>Weight (example)<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>CTI tradecraft &amp; lifecycle<\/td>\n<td>Clear PIR-driven approach; high-quality products with feedback loops<\/td>\n<td>15%<\/td>\n<\/tr>\n<tr>\n<td>Analytical rigor &amp; confidence handling<\/td>\n<td>Sound reasoning, bias awareness, calibrated confidence<\/td>\n<td>15%<\/td>\n<\/tr>\n<tr>\n<td>ATT&amp;CK mapping &amp; behavioral focus<\/td>\n<td>Maps TTPs to detection\/hunt opportunities; avoids IOC-only mindset<\/td>\n<td>10%<\/td>\n<\/tr>\n<tr>\n<td>Technical fluency (SIEM\/EDR\/logs)<\/td>\n<td>Can propose viable queries\/detections; understands telemetry constraints<\/td>\n<td>15%<\/td>\n<\/tr>\n<tr>\n<td>Operationalization &amp; impact<\/td>\n<td>Demonstrated examples of intel leading to shipped changes<\/td>\n<td>20%<\/td>\n<\/tr>\n<tr>\n<td>Incident support capability<\/td>\n<td>Useful real-time guidance; structured, calm approach<\/td>\n<td>10%<\/td>\n<\/tr>\n<tr>\n<td>Communication (written &amp; verbal)<\/td>\n<td>Clear, audience-appropriate briefs; concise executive narrative<\/td>\n<td>10%<\/td>\n<\/tr>\n<tr>\n<td>Leadership as Lead IC<\/td>\n<td>Mentorship, standards, cross-functional coordination<\/td>\n<td>5%<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">20) Final Role Scorecard Summary<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table>\n<thead>\n<tr>\n<th>Category<\/th>\n<th>Executive summary<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Role title<\/td>\n<td>Lead Threat Intelligence Specialist<\/td>\n<\/tr>\n<tr>\n<td>Role purpose<\/td>\n<td>Deliver and operationalize threat intelligence that improves prevention, detection, response, and executive risk decision-making in a software\/IT environment.<\/td>\n<\/tr>\n<tr>\n<td>Reports to<\/td>\n<td>Typically <strong>Director, Security Operations<\/strong> or <strong>Head of Detection &amp; Response<\/strong> (varies by org design).<\/td>\n<\/tr>\n<tr>\n<td>Top 10 responsibilities<\/td>\n<td>1) Define and manage PIRs and collection plans 2) Track priority threats\/campaigns 3) Produce actionable intelligence briefs 4) Provide incident intel support 5) Curate and score IOCs with TTL\/confidence 6) Map threats to MITRE ATT&amp;CK 7) Enable detections\/hunts with queries and telemetry requirements 8) Improve CTI program processes and governance 9) Inform vulnerability prioritization with exploitation trends 10) Mentor analysts and lead cross-functional initiatives<\/td>\n<\/tr>\n<tr>\n<td>Top 10 technical skills<\/td>\n<td>1) CTI lifecycle\/tradecraft 2) MITRE ATT&amp;CK mapping 3) IOC\/infrastructure analysis 4) SIEM query literacy 5) EDR\/XDR hunting literacy 6) Cloud\/identity threat knowledge 7) OSINT validation and source grading 8) TIP operations and curation 9) Structured analytic techniques\/confidence calibration 10) Detection enablement (logic, telemetry requirements, tuning guidance)<\/td>\n<\/tr>\n<tr>\n<td>Top 10 soft skills<\/td>\n<td>1) Analytical judgment 2) Executive communication 3) Operational empathy for SOC\/IR 4) Influence without authority 5) Calm under uncertainty 6) Stakeholder management 7) Documentation discipline 8) Mentorship\/quality leadership 9) Prioritization focus 10) Integrity and confidentiality handling<\/td>\n<\/tr>\n<tr>\n<td>Top tools or platforms<\/td>\n<td>TIP (MISP\/OpenCTI\/Anomali\/ThreatConnect etc.), SIEM (Splunk\/Sentinel\/Chronicle etc.), EDR (CrowdStrike\/Defender\/SentinelOne etc.), ATT&amp;CK Navigator, VirusTotal, passive DNS, sandboxing, Jira\/ServiceNow, Slack\/Teams, Confluence\/Notion, Python<\/td>\n<\/tr>\n<tr>\n<td>Top KPIs<\/td>\n<td>Intelligence-to-action conversion, stakeholder-rated relevance, time-to-triage for critical intel, detection coverage improvement for priority techniques, false positive reduction from feed tuning, incident intel SLA attainment, indicator quality score, source effectiveness index, threat hunting yield, stakeholder adoption\/engagement<\/td>\n<\/tr>\n<tr>\n<td>Main deliverables<\/td>\n<td>PIRs and collection plan; weekly digest; monthly landscape report; quarterly executive brief; actor\/campaign dossiers; hunt packages; detection enablement packages; IOC scoring\/TTL policy; CTI runbooks and templates; vendor\/source performance reviews<\/td>\n<\/tr>\n<tr>\n<td>Main goals<\/td>\n<td>First 90 days: establish cadence, PIRs, operationalization with detections\/hunts, measurable improvements in noise\/quality. First 12 months: consistent executive reporting, improved ATT&amp;CK coverage, demonstrable reduction in exposure and improved response outcomes tied to CTI.<\/td>\n<\/tr>\n<tr>\n<td>Career progression options<\/td>\n<td>Principal\/Staff Threat Intelligence Specialist; Threat Intelligence Manager; Head of Threat Intelligence; Detection &amp; Response leadership; Threat Hunting lead; Cloud\/Identity security specialization; Security strategy\/architecture (threat-informed).<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The **Lead Threat Intelligence Specialist** is a senior individual contributor who leads the design, execution, and operationalization of cyber threat intelligence (CTI) to reduce business risk and improve detection and response outcomes. This role turns external and internal threat signals into **actionable intelligence**: prioritized threats, attacker TTPs, indicators, assessments, and detection guidance that directly improves security posture.<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","_joinchat":[],"footnotes":""},"categories":[24460,24508],"tags":[],"class_list":["post-75070","post","type-post","status-publish","format-standard","hentry","category-security","category-specialist"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/75070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=75070"}],"version-history":[{"count":0,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/75070\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=75070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=75070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=75070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}