Cyber Intelligence Analyst

Jobgether • United State
Remote
Apply
AI Summary

Jobgether is seeking a Cyber Intelligence Analyst to analyze endpoint and network data, investigate sophisticated malware, and contribute to rapid incident containment and remediation efforts. This role combines deep technical investigation with strategic threat modeling and cross-functional collaboration. The ideal candidate will have strong expertise in malware reverse engineering and sandbox analysis.

Key Highlights
Monitor, identify, and analyze cybersecurity threats
Conduct in-depth malware analysis
Investigate security incidents and document findings
Key Responsibilities
Monitor, identify, and analyze cybersecurity threats
Conduct in-depth malware analysis
Investigate security incidents and document findings
Develop host- and network-based signatures
Apply threat modeling frameworks
Technical Skills Required
Malware reverse engineering Sandbox analysis SIEM technologies Linux UNIX Windows operating systems TCP/IP networking Firewalls Intrusion prevention systems IP routing
Benefits & Perks
Competitive base salary
Eligibility for annual short-term and/or long-term incentive compensation programs
Comprehensive medical, dental, and vision insurance coverage
Nice to Have
Public cloud security certifications (AWS, Azure, GCP)

Job Description


This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Cyber Intelligence Analyst in the United States.

This remote role offers the opportunity to operate at the forefront of enterprise cybersecurity, defending critical systems against advanced and evolving threats. As a Cyber Intelligence Analyst, you will analyze endpoint and network data, investigate sophisticated malware, and contribute to rapid incident containment and remediation efforts. You’ll work within a high-performing security environment, leveraging established frameworks and cutting-edge tools to detect, analyze, and neutralize cyber threats. The role combines deep technical investigation with strategic threat modeling and cross-functional collaboration. If you are passionate about malware research, behavioral threat detection, and protecting large-scale infrastructure, this position provides both impact and technical depth.

Accountabilities

  • Monitor, identify, and analyze cybersecurity threats across endpoint and network environments using established detection tools and processes.
  • Conduct in-depth malware analysis, including reverse engineering, sandboxing, and examination of packed or obfuscated code.
  • Investigate security incidents, perform containment and remediation activities, and document findings and resolutions thoroughly.
  • Develop host- and network-based signatures to detect malicious activity and recommend heuristic or anomaly-based detection strategies.
  • Apply threat modeling frameworks such as MITRE ATT&CK, Cyber Kill Chain, and Diamond Model to assess adversary tactics and techniques.
  • Utilize SIEM platforms and other security monitoring technologies to correlate events and uncover indicators of compromise.
  • Communicate findings clearly to stakeholders, educating asset owners and teams on risks, mitigation steps, and security best practices.
  • Provide support on a rotating basis to ensure continuous threat monitoring and response readiness.

Requirements

  • Proven experience as a Security Operations Center (SOC) Analyst or in a cybersecurity-focused incident response role.
  • Strong expertise in malware reverse engineering and sandbox analysis, including use of tools such as OllyDbg, Radare, GDB, or similar.
  • Hands-on experience with SIEM technologies and advanced log analysis.
  • Deep understanding of Linux, UNIX, Windows operating systems, TCP/IP networking, firewalls, intrusion prevention systems, and IP routing.
  • Knowledge of advanced persistent threats (APTs), attacker tools, tactics, and procedures targeting enterprise environments.
  • Ability to analyze shellcode and complex malicious algorithms, and create effective detection signatures.
  • Experience in information security research, technical writing, incident response, and risk assessment.
  • Bachelor’s degree preferred or equivalent practical experience.
  • Industry certifications such as GIAC GSEC (401), GCIH (504), GMON (511), or similar are preferred.
  • Public cloud security certifications (AWS, Azure, GCP) are a plus.
  • Must be authorized to work in the United States.

Benefits

  • Competitive base salary ranging from $84,900 to $157,320 per year, depending on location, skills, and experience.
  • Eligibility for annual short-term and/or long-term incentive compensation programs (performance-based).
  • Comprehensive medical, dental, and vision insurance coverage.
  • Flexible Spending Accounts (FSA) and Health Savings Accounts (HSA).
  • Life insurance, disability income protection, and Employee Assistance Program (EAP).
  • 401(k) retirement savings plan.
  • Paid vacation, holidays, sick leave, and family/medical leave as applicable.
  • Employee stock purchase program at a discounted rate.
  • Fully remote work environment with rotational support structure.

Why Apply Through Jobgether?

We use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team.

We appreciate your interest and wish you the best!

Why Apply Through Jobgether?

Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time.

We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.


Similar Jobs

Explore other opportunities that match your interests

Software Engineer - L3 Support

Programming
•
3h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

Canonical

United State

Senior Java Developer - Data Migration and Integration

Programming
•
4h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

Jobs via Dice

United State

Senior Oracle Integration Engineer (Remote)

Programming
•
9h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

crocs

United State

Subscribe our newsletter

New Things Will Always Update Regularly