Our client, a global leader in cybersecurity solutions, is seeking an experienced and highly analytical Principal Threat Intelligence Analyst to join their elite security operations team. This role is integral to protecting the organization and its clients from sophisticated cyber threats. While the role is based in Seattle, Washington, US , we are open to remote candidates with a proven history of independent, high-impact work in the information security domain. You will be responsible for collecting, analyzing, and disseminating threat intelligence to proactively identify, assess, and mitigate cyber risks. This includes tracking advanced persistent threats (APTs), nation-state actors, and sophisticated criminal enterprises. Your work will involve utilizing a wide range of intelligence sources, including open-source intelligence (OSINT), dark web monitoring, technical indicators, and human intelligence. You will develop actionable intelligence reports, providing insights into threat actor tactics, techniques, and procedures (TTPs), motivations, and capabilities. The ideal candidate will have a deep understanding of cybersecurity principles, network security, malware analysis, and incident response. You must possess strong research skills, exceptional analytical capabilities, and the ability to communicate complex technical information clearly and concisely to diverse audiences, including executive leadership. This position requires a minimum of 8-10 years of experience in threat intelligence, cybersecurity operations, or a related field, with a demonstrated ability to lead research initiatives. Experience with threat modeling, risk assessment, and the MITRE ATT&CK framework is essential. The ability to work autonomously and contribute strategically to the overall security posture of the organization is paramount.
Key Responsibilities: Conduct in-depth research and analysis of global cyber threats, threat actors, and their TTPs. Develop and maintain actionable threat intelligence reports, briefings, and alerts for various stakeholders. Leverage diverse intelligence sources (OSINT, dark web, technical feeds, internal data) to identify emerging threats and trends. Perform analysis of malware, phishing campaigns, and other malicious activities. Contribute to threat modeling and risk assessments to inform security strategy. Develop and refine intelligence collection requirements and methodologies. Collaborate with security operations, incident response, and vulnerability management teams to operationalize intelligence. Provide expert guidance on threat actor capabilities and potential impact on the organization. Stay abreast of the latest cybersecurity threats, vulnerabilities, and defensive technologies. Mentor junior analysts and contribute to the development of the threat intelligence program. Required Qualifications: Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Master's degree preferred. Minimum of 8-10 years of experience in threat intelligence, cybersecurity analysis, or a closely related role. Expertise in intelligence analysis methodologies and frameworks (e.g., Diamond Model, Cyber Kill Chain, MITRE ATT&CK). Proven ability to conduct research using OSINT and other intelligence sources. Strong understanding of networking protocols, operating systems, and common attack vectors. Experience with SIEM, SOAR, and threat intelligence platforms. Excellent written and verbal communication skills, with the ability to present complex technical information to non-technical audiences. Demonstrated leadership or mentoring experience. Relevant certifications (e.g., CISSP, GIAC) are a plus. Ability to work independently and as part of a distributed team. This is a prime opportunity to lead threat intelligence efforts from Seattle, Washington, US (or remotely), making a significant impact on cybersecurity.
principal
4/6/2026
You will be redirected to WhatJobs Direct's application portal.