MENU
  • Remote Jobs
  • Companies
  • Go Premium
  • Job Alerts
  • Post a Job
  • Log in
  • Sign up
Working Nomads logo Working Nomads
  • Remote Jobs
  • Companies
  • Post Jobs
  • Go Premium
  • Get Free Job Alerts
  • Log in

Senior Cyber Threat Intelligence Analyst

ExtraHop

Full-time
USA
$150k-$180k per year
analyst
intelligence analyst
sql
linux
security
Apply for this position

Position Summary

We are seeking a highly skilled and motivated Senior Cyber Threat Intelligence (CTI) Analyst with a strong technical background in cybersecurity and previous experience in creating high-quality customer-facing content. This individual will play a key role in researching emerging cyber threats and developing content such as white papers, blog posts, webinars, and other marketing materials with ExtraHop’s marketing team. The ideal candidate will have a deep understanding of threat actors and cybersecurity trends, combined with the ability to effectively communicate complex technical findings.

As a Senior CTI Analyst, you will work independently and collaborate with Detection Engineers, Threat Researchers and Data Scientists to analyze cyber threats and the marketing team to develop compelling and informative content that showcases the team’s findings and positions the company as a thought leader in the industry. 

ExtraHop R&D supports fully-flexible work options that include full-time onsite, hybrid, and fully remote working arrangements. Except for a few roles that require physical access, we believe in supporting you in making the choice that works best for you and makes the team successful. 

Key Responsibilities

  • Threat intelligence research and analysis:

    • Conduct in-depth research on emerging network security threats, threat actors, vulnerabilities, and malware campaigns.

    • Generate, collect, and enrich internal threat intelligence, including collections of IOCs, and Threat Actor Profiles.

    • Analyze customer logs and telemetry to identify new and novel threats.

    • Reproduce and simulate attack techniques in lab environments to understand their network signatures and to ensure thorough detection coverage. 

    • Continuously monitor threat intelligence sources to stay on top of emerging threats and trends.

    • Present findings and work results to other internal teams.

  • Content creation:

    • Produce high-quality, customer-facing strategic, operational, and tactical-level written assessments, including white papers, blog posts, and case studies.

    • Create and deliver engaging webinars, video content, and presentations to communicate research findings to both technical and non-technical audiences.

    • Work closely with the marketing team to craft messages that align with the company’s brand and objectives.

  • Mentorship:

    • Mentor others regarding Threat Intelligence, intelligence writing, threat actor tracking and attribution, and threat hunting. 

Required Qualifications

  • 5+ years of experience in threat research or threat intelligence

  • Subject Matter Expert (SME) for cyber threat actors TTPs.

  • Proven experience applying structure analytical techniques and intelligence methodologies to assess adversary activity, including the intelligence cycle, intelligence writing best practices, and frameworks such as the Diamond Model

  • Familiarity with threat modeling and adversary tracking frameworks such as MITRE ATT&CK, the Cyber Kill Chain, and related models to support campaign clustering, detection development, and intelligence reporting

  • Experience is producing public-facing strategic, operational, and tactical-level written content, including white papers, blog posts, newsletters, and/or video content, such as webinars

  • Experience with data aggregation, hunting and analysis tools, such as Synapse, MISP, or OpenCTI

  • Comfortable using SQL or other query language for threat hunting

Preferred Qualifications

  • Understanding of networking fundamentals, including the OSI model and excellent working knowledge of the key protocols from Layer 2 through Layer 7

  • Experience with security tools such as Kali Linux, Wireshark, TShark, tcpdump, Suricata, or other packet capture/analysis tools

  • Experience in detecting and reproducing network attacks, such as vulnerability exploitation, system discovery, and lateral movement techniques

  • In-depth knowledge of Windows protocols and attack techniques

  • Proficient in at least one scripting or programming language (e.g., Python, JavaScript, Golang, YAML/TOML, etc.)

  • Familiarity with software development tools such as: gitlab, github

  • Experience working with cross-functional teams, including marketing and sales

The salary range for this position is 150,000 - 180,000 + bonus + benefits

Apply for this position
Bookmark Report

About the job

Full-time
USA
$150k-$180k per year
Posted 4 days ago
analyst
intelligence analyst
sql
linux
security

Apply for this position

Bookmark
Report
Enhancv advertisement

30,000+
REMOTE JOBS

Unlock access to our database and
kickstart your remote career
Join Premium

Senior Cyber Threat Intelligence Analyst

ExtraHop

Position Summary

We are seeking a highly skilled and motivated Senior Cyber Threat Intelligence (CTI) Analyst with a strong technical background in cybersecurity and previous experience in creating high-quality customer-facing content. This individual will play a key role in researching emerging cyber threats and developing content such as white papers, blog posts, webinars, and other marketing materials with ExtraHop’s marketing team. The ideal candidate will have a deep understanding of threat actors and cybersecurity trends, combined with the ability to effectively communicate complex technical findings.

As a Senior CTI Analyst, you will work independently and collaborate with Detection Engineers, Threat Researchers and Data Scientists to analyze cyber threats and the marketing team to develop compelling and informative content that showcases the team’s findings and positions the company as a thought leader in the industry. 

ExtraHop R&D supports fully-flexible work options that include full-time onsite, hybrid, and fully remote working arrangements. Except for a few roles that require physical access, we believe in supporting you in making the choice that works best for you and makes the team successful. 

Key Responsibilities

  • Threat intelligence research and analysis:

    • Conduct in-depth research on emerging network security threats, threat actors, vulnerabilities, and malware campaigns.

    • Generate, collect, and enrich internal threat intelligence, including collections of IOCs, and Threat Actor Profiles.

    • Analyze customer logs and telemetry to identify new and novel threats.

    • Reproduce and simulate attack techniques in lab environments to understand their network signatures and to ensure thorough detection coverage. 

    • Continuously monitor threat intelligence sources to stay on top of emerging threats and trends.

    • Present findings and work results to other internal teams.

  • Content creation:

    • Produce high-quality, customer-facing strategic, operational, and tactical-level written assessments, including white papers, blog posts, and case studies.

    • Create and deliver engaging webinars, video content, and presentations to communicate research findings to both technical and non-technical audiences.

    • Work closely with the marketing team to craft messages that align with the company’s brand and objectives.

  • Mentorship:

    • Mentor others regarding Threat Intelligence, intelligence writing, threat actor tracking and attribution, and threat hunting. 

Required Qualifications

  • 5+ years of experience in threat research or threat intelligence

  • Subject Matter Expert (SME) for cyber threat actors TTPs.

  • Proven experience applying structure analytical techniques and intelligence methodologies to assess adversary activity, including the intelligence cycle, intelligence writing best practices, and frameworks such as the Diamond Model

  • Familiarity with threat modeling and adversary tracking frameworks such as MITRE ATT&CK, the Cyber Kill Chain, and related models to support campaign clustering, detection development, and intelligence reporting

  • Experience is producing public-facing strategic, operational, and tactical-level written content, including white papers, blog posts, newsletters, and/or video content, such as webinars

  • Experience with data aggregation, hunting and analysis tools, such as Synapse, MISP, or OpenCTI

  • Comfortable using SQL or other query language for threat hunting

Preferred Qualifications

  • Understanding of networking fundamentals, including the OSI model and excellent working knowledge of the key protocols from Layer 2 through Layer 7

  • Experience with security tools such as Kali Linux, Wireshark, TShark, tcpdump, Suricata, or other packet capture/analysis tools

  • Experience in detecting and reproducing network attacks, such as vulnerability exploitation, system discovery, and lateral movement techniques

  • In-depth knowledge of Windows protocols and attack techniques

  • Proficient in at least one scripting or programming language (e.g., Python, JavaScript, Golang, YAML/TOML, etc.)

  • Familiarity with software development tools such as: gitlab, github

  • Experience working with cross-functional teams, including marketing and sales

The salary range for this position is 150,000 - 180,000 + bonus + benefits

Working Nomads

Post Jobs
Premium Subscription
Sponsorship
Free Job Alerts

Job Skills
Jobs by Location
API
FAQ
Privacy policy
Terms and conditions
Contact us
About us

Jobs by Category

Remote Administration jobs
Remote Consulting jobs
Remote Customer Success jobs
Remote Development jobs
Remote Design jobs
Remote Education jobs
Remote Finance jobs
Remote Legal jobs
Remote Healthcare jobs
Remote Human Resources jobs
Remote Management jobs
Remote Marketing jobs
Remote Sales jobs
Remote System Administration jobs
Remote Writing jobs

Jobs by Position Type

Remote Full-time jobs
Remote Part-time jobs
Remote Contract jobs

Jobs by Region

Remote jobs Anywhere
Remote jobs North America
Remote jobs Latin America
Remote jobs Europe
Remote jobs Middle East
Remote jobs Africa
Remote jobs APAC

Jobs by Skill

Remote Accounting jobs
Remote Assistant jobs
Remote Copywriting jobs
Remote Cyber Security jobs
Remote Data Analyst jobs
Remote Data Entry jobs
Remote English jobs
Remote Spanish jobs
Remote Project Management jobs
Remote QA jobs
Remote SEO jobs

Jobs by Country

Remote jobs Australia
Remote jobs Argentina
Remote jobs Brazil
Remote jobs Canada
Remote jobs Colombia
Remote jobs France
Remote jobs Germany
Remote jobs Ireland
Remote jobs India
Remote jobs Japan
Remote jobs Mexico
Remote jobs Netherlands
Remote jobs New Zealand
Remote jobs Philippines
Remote jobs Poland
Remote jobs Portugal
Remote jobs Singapore
Remote jobs Spain
Remote jobs UK
Remote jobs USA


Working Nomads curates remote digital jobs from around the web.

© 2025 Working Nomads.