Center for Internet Security, Inc.

Cyber Intelligence Analyst

Job Locations US-NY-Albany | US-Remote
Cybersecurity Operations
Regular Full-Time


As a Cyber Threat Intelligence Analyst, you will identify and begin to apply data and technical analysis to aid in and draft actionable Cyber Threat Intelligence (CTI) catered to state, local, tribal, and territorial (SLTT) governments. As a member of the CTI Team, you will work alongside operations teams in the 24x7 Security Operations Center (SOC) and partners, with minimal oversight, in both a classified and unclassified environment in order to develop tactical, operational, and strategic intelligence about threat groups targeting SLTT, their methodologies, and motivations. This position may involve essential duties and responsibilities that must continue during crisis situations and contingency operations, necessitating extended working hours.

What You'll Do

  • Conduct CTI initiatives in support of state, local, tribal, and territorial (SLTT) governments to include determining their intelligence needs and requirements, and identifying the most effective methods for fulfilling these unique requirements
  • Identify emerging trends based upon extensive research into current threat activity and determine customer-relevant threat intelligence with minimal assistance or oversight
  • Draft briefing material, written products, and simple graphics in order to convey analysis both verbally and in writing to a variety of audiences
  • Correlate threat intelligence to observed activity impacting the customer and begin to apply security countermeasures based on industry frameworks and analytic models (e.g. MITRE ATT&CK, VERIS, Diamond Model of Intrusion Analysis)
  • Other tasks and responsibilities as assigned

What You'll Need

  • Bachelor’s degree in Cybersecurity, Computer Science, Intelligence, or a related field*.
  • 1+ years’ experience in an analytical role of either network forensics analyst, intelligence threat analyst, security engineer/ consultant.
  • Experience in investigative or incident response environments.
  • Basic understanding of network architecture and network security methods (web content filtering, domain reputation policy, snort signatures, host-based analysis systems, email analysis)
  • Basic understanding of programming/scripting languages (Python, Bash, Perl, C/C++, or JavaScript) and Structured Query Language (SQL).
  • Great verbal and written communication skills including the ability to articulate cyber matters to a variety of audiences and to adapt to a variety of customer personalities.
  • Must be capable of obtaining and maintaining a Top-Secret National Security clearance
  • Must be authorized to work in the United States
  • The position is open to U.S. citizens and requires a favorably adjudicated DHS Fitness Review for Public Trust Positions**

It's a Plus if you have:

  • Master's degree in related field
  • Experience with the R statistical programming language
  • Experience with static or dynamic malware analysis
  • Certifications in related areas (e.g. GCTI, GCIH, GCFE, GCFA, etc.)
  • Working knowledge of the U.S. Intelligence Community, SLTT governments, and/or fusion centers

*Additional years of relevant experience or a combination of an Associate’s degree or equivalent and relevant experience may be substituted for the Bachelor’s degree.


**Factors that may cause a negative Fitness Review decision include:

  • Criminal Conduct
  • Dishonest Conduct
  • Employment Misconduct
  • Alcohol Abuse
  • Drug Use (illegal drug use or use of a legal drug in a manner that deviates from approved medical direction) Additionally, illegal drug use includes the use of drugs that are illegal for federal purposes despite being legal in select states and countries, such as marijuana.)
  • False Statements
  • Financial Issues
  • Have not resided in the US for three (3) of the past five (5) years


Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed