K.L. McKinney
Houston, Texas
03/03/2026
Travel Requirement: Up to 80% Our client, a rapidly growing digital forensics, eDiscovery, and cybersecurity services provider delivering comprehensive data solutions to law firms, corporations, and government entities, seeks a Threat Intelligence Analyst. The hiring company is known for its commitment to technical excellence, client trust, and precision in handling sensitive digital evidence. With a focus on quality, collaboration, and innovation, the organization continues to expand its footprint across multiple service lines in digital investigations and data management. Position Overview The Threat Intelligence Analyst collects, analyzes, and interprets cyber threat intelligence to identify and mitigate security risks. The ideal candidate will have expertise in cyber threat analysis, malware research, and adversary tracking to proactively defend against emerging threats. This role involves working with SOC, incident response, and security operations teams to enhance threat detection and response capabilities. Key Responsibilities: Threat Intelligence Collection & Analysis Gather and analyze threat intelligence from open sources (OSINT), dark web, threat feeds, and industry reports. Identify Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) used by threat actors. Track Advanced Persistent Threats (APTs) and emerging cyber threats relevant to the organization. Threat Detection & Response Support Collaborate with SOC analysts, incident responders, and security engineers to enhance cyber defenses. Provide real-time intelligence during security incidents to assist in rapid response. Develop YARA rules, Sigma rules, and threat hunting queries to detect malicious activity. Malware Analysis & Forensics Analyze malware samples, phishing campaigns, and exploit techniques used in attacks. Reverse-engineer malware to extract IOCs and behavioral patterns. Contribute to the development of security detections, playbooks, and automated threat response. Threat Intelligence Reporting & Communication Create intelligence reports, dashboards, and risk assessments for stakeholders. Provide threat briefings and recommendations to security teams and leadership. Maintain documentation of threat actor profiles, attack campaigns, and evolving threats. Security Strategy & Continuous Improvement Improve threat intelligence sharing and collaboration with industry partners and ISACs. Stay updated on nation-state actors, cybercriminal groups, and hacktivist movements. Enhance security policies, detection capabilities, and proactive defense measures. Qualifications & Skills: Education: Bachelors or Masters degree in Cybersecurity, Computer Science, Intelligence Studies, or a related field. Experience: 3+ years in threat intelligence, SOC operations, malware analysis, or cybersecurity research. Certifications (Preferred): CTIA, GCTI, CISSP, CEH, OSCP, or equivalent. Technical Proficiency: Experience with Threat Intelligence Platforms (TIPs), SIEM (Splunk, QRadar), and EDR solutions. Proficiency in OSINT tools (Shodan, VirusTotal, Threat Intelligence Feeds, MISP, Maltego). Strong understanding of MITRE ATT&CK, cyber kill chain, and adversary tactics. Familiarity with Python, PowerShell, or Bash scripting for automation and data analysis. Analytical & Critical Thinking: Ability to assess threat intelligence and correlate findings to security incidents. Communication Skills: Strong ability to present complex threat intelligence insights to technical and non-technical audiences. Work Environment & Schedule: Full-time role with remote or hybrid work options. May require on-call support for high-priority security incidents. Collaboration with SOC teams, government agencies, law enforcement, and industry partners. Must be able to travel internationally