Find your dream job faster with JobLogr
AI-powered job search, resume help, and more.
Try for Free
Recorded Future

Recorded Future

via Remote Rocketship

Apply Now
All our jobs are verified from trusted employers and sources. We connect to legitimate platforms only.

Senior Threat Intelligence Analyst – Russia APT Focus

Anywhere
full-time
Posted 9/3/2025
Verified Source
Key Skills:
Threat Intelligence
Malware Analysis
TCP/IP Networking Protocols
Python Scripting
CTI Research Tools (Maltego, Jupyter Notebook, Elastic Stack)
Structured Analytical Techniques
MITRE ATT&CK Framework
Open-Source Intelligence Gathering

Compensation

Salary Range

$120K - 180K a year

Responsibilities

Conduct proactive research and analysis on state-sponsored APT activity, develop detection mechanisms, mentor colleagues, collaborate with cross-functional teams, and support customer intelligence needs.

Requirements

5+ years in Information Security or Threat Intelligence with experience in technical threat analysis, malware analysis, scripting, CTI research tools, and knowledge of threat frameworks and models.

Full Description

Description: • Conduct proactive research on state-sponsored APT activity by synthesizing multiple technical datasets to develop novel insights and high-quality reporting • Establish and refine methods to track APT campaigns using network, intrusion, and malware analysis • Hunt for threat actor infrastructure and activity across diverse technical data sources, leveraging banner data, service metadata, and related technical artifacts • Identify, prioritize, and deploy detection mechanisms for command-and-control infrastructure, malware families, and threat groups of interest • Continuously evaluate and improve threat intelligence workflows, identifying opportunities to enhance automation, efficiency, and analytic precision • Stay up to date on evolving APT tradecraft by regularly reviewing technical publications, blogs, and intelligence from trusted sharing communities • Mentor colleagues on intrusion analysis tradecraft and threat intelligence best practices • Collaborate with geopolitical and regional analysis teams to support cross-functional research • Propose and evaluate new data sources and analytical methods to enhance or automate the intelligence cycle • Represent Insikt Group externally as a subject matter expert through customer briefings, media engagements, or public research dissemination • Collaborate with engineering and data science teams to ensure effective integration of relevant data and analytics into the Recorded Future platform • Support customer intelligence needs through Recorded Future’s Analyst-on-Demand service Requirements: • BA/BS or equivalent experience in Computer Science, Computer Engineering, Information Security, Security Studies, Intelligence, or a related field • Preferably 5+ years of experience in Information Security and/or Threat Intelligence • Demonstrated experience conducting technical threat analysis and research • In-depth knowledge of TCP/IP and other networking protocols and datasets relevant to intrusion and network infrastructure analysis • Demonstrated capability in identifying and tracking infrastructure through methods such as banner analysis and metadata correlation • Experience with static and dynamic malware analysis, including family attribution and variant clustering • Proficiency in scripting (Python preferred, or Go, C, C++, Java) • Fluency with common CTI research tools such as Maltego, Jupyter Notebook, the Elastic Stack, and similar tools • Proven experience applying structured analytical techniques and intelligence methodologies, including the intelligence cycle, intelligence writing best practices, and frameworks such as the Diamond Model • Familiarity with MITRE ATT&CK, the Cyber Kill Chain, and related models • Detailed understanding of existing APT groups’ past activities, TTPs, motivations, and targeting patterns • Experience with open-source intelligence-gathering tools and techniques • Experience working directly with customers, with strong written and verbal communication skills • Strong interpersonal and teamwork skills, including working with globally distributed team members • Preferred: MA/MS or equivalent experience in Computer Science, Computer Engineering, Information Security, or a related field • Preferred: Experience writing network and endpoint detection signatures • Preferred: Experience with Windows, iOS, Android, macOS, or malware analysis • Preferred: Proficiency in a high-priority foreign language (Arabic, Chinese, Farsi, Korean, Portuguese, Russian, or Spanish) Benefits: • This position may be eligible for incentive compensation, equity, and medical, dental, vision, life insurance and 401K. • Your recruiter can share more about the specific details of the compensation and benefit package during the hiring process.

This job posting was last updated on 9/10/2025

Ready to have AI work for you in your job search?

Sign-up for free and start using JobLogr today!

Get Started »
JobLogr badgeTinyLaunch BadgeJobLogr - AI Job Search Tools to Land Your Next Job Faster than Ever | Product Hunt