Senior Threat Intelligence Analyst

Booking Booking · Hospitality · Amsterdam, Netherlands · Security & Infrastructure

Senior Threat Intelligence Analyst responsible for maturing the threat intelligence offering, conducting proactive research on cyber attacks, performing daily operational tasks, leading intelligence requirement gathering, producing tailored threat intelligence reporting, and collaborating with vendors and internal teams. The role involves leveraging AI and LLMs for intelligence use cases and requires experience in scripting/engineering for automation.

What you'd actually do

  1. Conduct proactive research to gather intelligence on cyber attacks and emerging tools and techniques to identify threats to Booking.com on all tactical, operational and strategic levels on new and existing threats
  2. Perform daily operational threat intelligence tasks, including triaging cases, investigating incidents, and producing reports, while continually creating and tuning alert rules.
  3. Lead intelligence requirement (IR) gathering sessions with new operations teams as intelligence services expand across the organization, and manage the IR framework and implementation plans.
  4. Independently lead the design, implementation, and operationalization of new intelligence requirements, including developing processes, workflows, and integrations to ensure effective intelligence collection, processing, and dissemination.
  5. Produce tailored threat intelligence reporting and provide actionable recommendations to Security and Fraud teams, including strategic briefings for leadership and operational or tactical intelligence to strengthen cybersecurity defenses.

Skills

Required

  • 2+ years of experience in the domain of threat intelligence
  • Experience in fraud and/or cyber threats in an enterprise environment
  • Strong analytical and critical thinking capabilities
  • Structured approach to investigation and problem-solving
  • Able to drive Dark Web and OSINT investigations
  • Able to conduct threat actor profiling
  • Able to conduct investigations by using both open source and commercial sources
  • Experience of evaluating, implementing and operationalizing threat intelligence platforms / tools
  • Experience with scripting or engineering to automate processes and integrate threat intelligence tooling
  • Experience leveraging AI and Large Language Models (LLMs) for intelligence use cases while ensuring safe and secure implementation and integration
  • Advanced stakeholder management skills
  • Excellent written and verbal communication skills
  • Report writing capabilities that can address both technical and non-technical audiences
  • Experience in contributing to the maturity and strategy of threat intelligence operations
  • BA/BS Degree ideally in Computer Science, Cyber Security, Information Security, Engineering or Information Technology

Nice to have

  • Experience with Threat Intelligence and SOAR platforms
  • Experience in one or more of the following roles: Security Engineer, CTI Analyst, Security Researcher, Malware analyst, CSIRT Analyst, Fraud Analyst, Safety and Security Response Analyst, or equivalent
  • Knowledge of frameworks, data models, and taxonomies related to Cyber or Fraud, such as Diamond model, TLP, TAXII, STIX, MITRE ATT&CK, SIGMA, etc.

What the JD emphasized

  • Experience leveraging AI and Large Language Models (LLMs) for intelligence use cases while ensuring safe and secure implementation and integration.