MENU
  • Remote Jobs
  • Companies
  • Go Premium
  • Job Alerts
  • Post a Job
  • Log in
  • Sign up
Working Nomads logo Working Nomads
  • Remote Jobs
  • Companies
  • Post Jobs
  • Go Premium
  • Get Free Job Alerts
  • Log in

Threat Intelligence Consultant

GuidePoint Security

Full-time
USA
python
aws
azure
infosec
cloud
Apply for this position

GuidePoint Security’s Research & Intelligence Team (GRIT) performs the following:

  • Threat Intelligence as a Service

  • Threat Intelligence Advisory Services

  • Exposure Management Services

  • Malware Analysis

  • Proactive Threat Discovery and Threat Hunting

  • CTI Support to GuidePoint’s Digital Forensics and Incident Response (DFIR) Practice

  • Threat Research

As a GRIT Consultant, you will be a technical resource that leverages your knowledge, skills, and experience to help deliver results to clients in various sectors.

Role Requirements

Your primary responsibilities revolve around solving challenging and complex problems and include helping customers reach their Threat Intelligence goals. GRIT provides managed Threat Intelligence and Exposure Management services, Deep and Dark Web investigations, threat briefings, and advisory consulting in CTI operationalization, maturity, and program development. In each of these services, our goal is to better secure and prepare our clients to build, implement, and improve their security and CTI programs through advisory, instruction, assistance, or direct support.

Additionally, GRIT supports GuidePoint’s DFIR practice, providing Threat Intelligence support to active intrusion investigations and response efforts, or informing DFIR advisory efforts and tabletop exercises. GRIT performs independent threat research into Ransomware and the cybercrime threat landscape, contributing to quarterly and annual reports, as well as Requests For Information (RFIs) and media inquiries.

GuidePoint Security’s GRIT service offerings are perpetually evolving in response to emerging threats and diverse client needs, and your creativity and expertise will assist the GRIT Practice with adapting to this rapidly changing environment. Primary Duties will include:

  • Operate as a technical resource within the Practice and actively participate in DFIR investigations to provide actionable intelligence

  • Effective engagement communication, time management, and collaboration with peers and clients

  • Author comprehensive engagement deliverables that are tailored to both technical and managerial audiences; fully detail the technical findings, recommendations, business impact, and realistic remediation strategies

  • Foster client relationships by providing support, information, and guidance

  • Utilize automation, orchestration, and scripting to reduce manual processes, improving overall efficiency while also enabling new capabilities to meet the rapidly changing needs of our clients

  • Contribute to integration of existing and future open-source and commercial tools to help improve GRIT processes and procedures

  • Perpetually strengthen relevant skills, knowledge, and abilities to stay at the forefront of the information security industry

  • Maintain a strong desire to learn, adapt, and improve along with a rapidly-growing company

Education and Experience

Essential Qualifications

  • Two (2+) years of experience performing Threat Intelligence analysis

  • Five (5+) combined years of IT and information security experience

Preferred Qualifications

  • Prior experience in a Consulting Services role

  • Experience implementing or improving operational processes or procedures in the intelligence analysis lifecycle

  • Proficiency hunting APT data using open source or commercial cyber threat analytic tools or data repositories such as VirusTotal, Passive Total, Threat Miner, or Maltego

  • Experience in scoping and conducting threat research centered on cybercrime, ransomware, and/or nation-state cyber operations

Core capabilities include:

  • Network traffic analysis

  • Host forensics

  • Malware handling / triage

  • Log review

  • Experience with a variety of industry-related solutions including EDR, SIEM, NDR, FW, NGAV, Velociraptor, OSQuery, and others

  • Strong ability to correlate data and research using open-source repositories (ex. VirusTotal, Domaintools, Threatminer, etc.)

  • Intermediate ability to present technical information and analysis to audiences up to 50 persons on a quarterly basis.

  • Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity.

  • Ability to make confidence-based assessments for purposes of attribution based on their technical analysis of network traffic, multi-source data, malware and system analysis. Candidate must be able to identify analytic bias

  • Experience with common programming languages including PowerShell, Python, BASH, Go, or others

  • Experience with cloud technologies for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure.

  • Awareness of attacker techniques, advanced threat groups, and integration of intelligence into an investigation

  • Other relevant industry certifications, such as but not limited to CASP+, CySA+, GCIA, GCIH, GDAT, GCFE, GFCA, GREM, PMRP, and Sec+

 

Apply for this position
Bookmark Report

About the job

Full-time
USA
Posted 2 days ago
python
aws
azure
infosec
cloud

Apply for this position

Bookmark
Report
Enhancv advertisement

30,000+
REMOTE JOBS

Unlock access to our database and
kickstart your remote career
Join Premium

Threat Intelligence Consultant

GuidePoint Security

GuidePoint Security’s Research & Intelligence Team (GRIT) performs the following:

  • Threat Intelligence as a Service

  • Threat Intelligence Advisory Services

  • Exposure Management Services

  • Malware Analysis

  • Proactive Threat Discovery and Threat Hunting

  • CTI Support to GuidePoint’s Digital Forensics and Incident Response (DFIR) Practice

  • Threat Research

As a GRIT Consultant, you will be a technical resource that leverages your knowledge, skills, and experience to help deliver results to clients in various sectors.

Role Requirements

Your primary responsibilities revolve around solving challenging and complex problems and include helping customers reach their Threat Intelligence goals. GRIT provides managed Threat Intelligence and Exposure Management services, Deep and Dark Web investigations, threat briefings, and advisory consulting in CTI operationalization, maturity, and program development. In each of these services, our goal is to better secure and prepare our clients to build, implement, and improve their security and CTI programs through advisory, instruction, assistance, or direct support.

Additionally, GRIT supports GuidePoint’s DFIR practice, providing Threat Intelligence support to active intrusion investigations and response efforts, or informing DFIR advisory efforts and tabletop exercises. GRIT performs independent threat research into Ransomware and the cybercrime threat landscape, contributing to quarterly and annual reports, as well as Requests For Information (RFIs) and media inquiries.

GuidePoint Security’s GRIT service offerings are perpetually evolving in response to emerging threats and diverse client needs, and your creativity and expertise will assist the GRIT Practice with adapting to this rapidly changing environment. Primary Duties will include:

  • Operate as a technical resource within the Practice and actively participate in DFIR investigations to provide actionable intelligence

  • Effective engagement communication, time management, and collaboration with peers and clients

  • Author comprehensive engagement deliverables that are tailored to both technical and managerial audiences; fully detail the technical findings, recommendations, business impact, and realistic remediation strategies

  • Foster client relationships by providing support, information, and guidance

  • Utilize automation, orchestration, and scripting to reduce manual processes, improving overall efficiency while also enabling new capabilities to meet the rapidly changing needs of our clients

  • Contribute to integration of existing and future open-source and commercial tools to help improve GRIT processes and procedures

  • Perpetually strengthen relevant skills, knowledge, and abilities to stay at the forefront of the information security industry

  • Maintain a strong desire to learn, adapt, and improve along with a rapidly-growing company

Education and Experience

Essential Qualifications

  • Two (2+) years of experience performing Threat Intelligence analysis

  • Five (5+) combined years of IT and information security experience

Preferred Qualifications

  • Prior experience in a Consulting Services role

  • Experience implementing or improving operational processes or procedures in the intelligence analysis lifecycle

  • Proficiency hunting APT data using open source or commercial cyber threat analytic tools or data repositories such as VirusTotal, Passive Total, Threat Miner, or Maltego

  • Experience in scoping and conducting threat research centered on cybercrime, ransomware, and/or nation-state cyber operations

Core capabilities include:

  • Network traffic analysis

  • Host forensics

  • Malware handling / triage

  • Log review

  • Experience with a variety of industry-related solutions including EDR, SIEM, NDR, FW, NGAV, Velociraptor, OSQuery, and others

  • Strong ability to correlate data and research using open-source repositories (ex. VirusTotal, Domaintools, Threatminer, etc.)

  • Intermediate ability to present technical information and analysis to audiences up to 50 persons on a quarterly basis.

  • Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity.

  • Ability to make confidence-based assessments for purposes of attribution based on their technical analysis of network traffic, multi-source data, malware and system analysis. Candidate must be able to identify analytic bias

  • Experience with common programming languages including PowerShell, Python, BASH, Go, or others

  • Experience with cloud technologies for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure.

  • Awareness of attacker techniques, advanced threat groups, and integration of intelligence into an investigation

  • Other relevant industry certifications, such as but not limited to CASP+, CySA+, GCIA, GCIH, GDAT, GCFE, GFCA, GREM, PMRP, and Sec+

 

Working Nomads

Post Jobs
Premium Subscription
Sponsorship
Free Job Alerts

Job Skills
API
FAQ
Privacy policy
Terms and conditions
Contact us
About us

Jobs by Category

Remote Administration jobs
Remote Consulting jobs
Remote Customer Success jobs
Remote Development jobs
Remote Design jobs
Remote Education jobs
Remote Finance jobs
Remote Legal jobs
Remote Healthcare jobs
Remote Human Resources jobs
Remote Management jobs
Remote Marketing jobs
Remote Sales jobs
Remote System Administration jobs
Remote Writing jobs

Jobs by Position Type

Remote Full-time jobs
Remote Part-time jobs
Remote Contract jobs

Jobs by Region

Remote jobs Anywhere
Remote jobs North America
Remote jobs Latin America
Remote jobs Europe
Remote jobs Middle East
Remote jobs Africa
Remote jobs APAC

Jobs by Skill

Remote Accounting jobs
Remote Assistant jobs
Remote Copywriting jobs
Remote Cyber Security jobs
Remote Data Analyst jobs
Remote Data Entry jobs
Remote English jobs
Remote Spanish jobs
Remote Project Management jobs
Remote QA jobs
Remote SEO jobs

Jobs by Country

Remote jobs Australia
Remote jobs Argentina
Remote jobs Brazil
Remote jobs Canada
Remote jobs Colombia
Remote jobs France
Remote jobs Germany
Remote jobs Ireland
Remote jobs India
Remote jobs Japan
Remote jobs Mexico
Remote jobs Netherlands
Remote jobs New Zealand
Remote jobs Philippines
Remote jobs Poland
Remote jobs Portugal
Remote jobs Singapore
Remote jobs Spain
Remote jobs UK
Remote jobs USA


Working Nomads curates remote digital jobs from around the web.

© 2025 Working Nomads.