This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Cyber Intelligence Analyst in the United States.
This remote role offers the opportunity to operate at the forefront of enterprise cybersecurity, defending critical systems against advanced and evolving threats. As a Cyber Intelligence Analyst, you will analyze endpoint and network data, investigate sophisticated malware, and contribute to rapid incident containment and remediation efforts. You’ll work within a high-performing security environment, leveraging established frameworks and cutting-edge tools to detect, analyze, and neutralize cyber threats. The role combines deep technical investigation with strategic threat modeling and cross-functional collaboration. If you are passionate about malware research, behavioral threat detection, and protecting large-scale infrastructure, this position provides both impact and technical depth.
Accountabilities:
- Monitor, identify, and analyze cybersecurity threats across endpoint and network environments using established detection tools and processes.
- Conduct in-depth malware analysis, including reverse engineering, sandboxing, and examination of packed or obfuscated code.
- Investigate security incidents, perform containment and remediation activities, and document findings and resolutions thoroughly.
- Develop host- and network-based signatures to detect malicious activity and recommend heuristic or anomaly-based detection strategies.
- Apply threat modeling frameworks such as MITRE ATT&CK, Cyber Kill Chain, and Diamond Model to assess adversary tactics and techniques.
- Utilize SIEM platforms and other security monitoring technologies to correlate events and uncover indicators of compromise.
- Communicate findings clearly to stakeholders, educating asset owners and teams on risks, mitigation steps, and security best practices.
- Provide support on a rotating basis to ensure continuous threat monitoring and response readiness.
Requirements:
Proven experience as a Security Operations Center (SOC) Analyst or in a cybersecurity-focused incident response role.Strong expertise in malware reverse engineering and sandbox analysis, including use of tools such as OllyDbg, Radare, GDB, or similar.Hands-on experience with SIEM technologies and advanced log analysis.Deep understanding of Linux, UNIX, Windows operating systems, TCP/IP networking, firewalls, intrusion prevention systems, and IP routing.Knowledge of advanced persistent threats (APTs), attacker tools, tactics, and procedures targeting enterprise environments.Ability to analyze shellcode and complex malicious algorithms, and create effective detection signatures.Experience in information security research, technical writing, incident response, and risk assessment.Bachelor’s degree preferred or equivalent practical experience.Industry certifications such as GIAC GSEC (401), GCIH (504), GMON (511), or similar are preferred.Public cloud security certifications (AWS, Azure, GCP) are a plus.Must be authorized to work in the United States.Benefits:
Competitive base salary ranging from $84,900 to $157,320 per year, depending on location, skills, and experience.Eligibility for annual short-term and/or long-term incentive compensation programs (performance-based).Comprehensive medical, dental, and vision insurance coverage.Flexible Spending Accounts (FSA) and Health Savings Accounts (HSA).Life insurance, disability income protection, and Employee Assistance Program (EAP).401(k) retirement savings plan.Paid vacation, holidays, sick leave, and family/medical leave as applicable.Employee stock purchase program at a discounted rate.Fully remote work environment with rotational support structure.