Sr. Intelligence Analyst | Remote, USA

Optiv Security, Inc.
Austin, US
Remote

Job Description

The Senior Cyber Threat Intelligence Analyst is a key member of the Global Threat Intelligence Center (gTIC), responsible for leading advanced intelligence research, driving threatinformed defense initiatives, and producing highimpact intelligence products for internal stakeholders and external clients. This role blends handson OSINT investigations, automated threat intelligence pipeline management, deepdive adversary research, and crossteam collaboration in support of ongoing cyber defense operations.

Candidates must demonstrate strong analytical tradecraft, mastery of intelligence frameworks, and the ability to communicate complex threats clearly to both technical and executive audiences.

How you'll make an impact:

Threat Intelligence Research & Analysis

  • Conduct daily OSINTbased threat hunting to identify emerging threats, adversary behaviors, and relevant indicators of compromise (IOCs).
  • Perform guided and unguided research into threat actors, campaigns, malware families, vulnerabilities, and exploits.
  • Analyze open and closed environments to map adversary networks, identify credible threats, and track actor communities.
  • Produce tactical, operational, and strategic intelligence products, including clientfacing briefings, written assessments, and threat forecasts.
  • Develop comprehensive threat reports on adversaries, global cyber events, and counterthreat considerations.
  • Act as a senior escalation point for incident responders, threat analysts, and engineering teams.

Automation, Enrichment & Technical Support

  • Leverage RESTful APIs, Python, and automation tooling to upload, validate, and enrich IOCs.
  • Assess and maintain automated threat intelligence sources; add, tune, or deprecate feeds as needed.

CrossTeam Collaboration & Client Engagement

  • Work collaboratively with IR teams, SOC leadership, and partner units to support threatinformed detection engineering and active cyber campaign response.
  • Respond to Requests for Information (RFIs) and investigate potential false positives or intelligence mismatches.
  • Brief internal stakeholders, leadership, and clients on evolving threat activity and recommended defensive actions.
  • Participate in industry forums and represent gTIC through research publications, conference presentations, and community engagement.
  • Drive continuous improvement of the intelligence lifecycle, collection management, and analytic rigor.
  • Support development of nextgeneration analytics platforms and bigdatadriven intelligence capabilities.
  • Travel as needed (up to 15-20%) for client engagements, conferences, and intelligencesharing events.

What we're looking for:

  • 8+ years of experience in cybersecurity, threat intelligence, incident response, or related technical fields - or equivalent demonstration of capability and excellence.
  • Proven experience with OSINT methodologies and threat research fundamentals.
  • Strong understanding of intelligence tradecraft frameworks, including:
  • MITRE ATT&CK
  • Diamond Model
  • Intelligence Cycle
  • Cyber Kill Chain
  • Pyramid of Pain
  • Solid knowledge of malware analysis concepts and how malware informs intelligence operations.
  • Working knowledge of modern cybersecurity tooling including SIEM, EDR, and vulnerability assessment platforms.
  • Proficiency with Python or similar scripting languages.
  • Strong Linux foundation and comfort with commandline utilities.
  • Excellent written and verbal communication skills, including the ability to translate complex technical findings into clear, concise reports.
  • Experience delivering clientfacing briefings and handling executivelevel conversations.
  • Strong time management and ability to prioritize multiple concurrent research tasks.

Preferred Qualifications

  • Security certifications such as OSCP, GIAC (GCTI/GOSI/GREM), CEH, Security+, or similar.
  • Strong understanding of exploitation techniques, lowlevel system fundamentals, assembly, or processor architecture.
  • Experience with bigdata analytics platforms or developing nextgeneration threat intelligence capabilities.
  • Track record of publishing research or presenting at conferences.
  • #LI-GN1

What you can expect from Optiv

  • A company committed to our inclusive value through our Employee Resource Groups
  • Work/life balance
  • Professional training resources
  • Creative problem-solving and the ability to tackle unique, complex projects
  • Volunteer Opportunities. "Optiv Chips In" encourages employees to volunteer and engage with their teams and communities.
  • The ability and technology necessary to productively work remotely/from home (where applicable)

EEO Statement

Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protect

Skills & Requirements

Technical Skills

OsintPythonRestful apisMalware analysisSiemEdrVulnerability assessmentLinuxCommunicationCollaborationCybersecurityThreat intelligenceIncident response

Level

senior

Posted

4/25/2026

Apply Now

You will be redirected to Optiv Security, Inc.'s application portal.