Sr Cybersecurity Analyst - Cyber Threat Intelligence (cti)

Target Target · Retail · Nationwide

This role focuses on identifying, collecting, analyzing, and disseminating intelligence on cyber threats relevant to Target. It involves converting threat reporting and technical indicators into actionable insights for detection and response, partnering with various security teams, and producing intelligence products. The role requires expertise in analytic rigor, technical curiosity, and the ability to operate independently while collaborating across teams.

What you'd actually do

  1. Serve as an all-source cyber threat intelligence analyst supporting operational and tactical CTI priorities through the collection, evaluation, cataloging, and analysis of threat information from internal telemetry, external reporting, open-source research, vendor sources, peer communities, and security investigations.
  2. Analyze indicators of compromise, threat actor TTPs, intrusion patterns, malware behaviors, infrastructure, vulnerabilities, and campaign activity to generate actionable intelligence for Target.
  3. Develop and maintain subject-matter expertise on cybercriminal groups, emerging threats, technology platforms, and threat vectors relevant to Target’s operating environment.
  4. Partner with CSIRT, Reverse Engineering, Threat Management, Vulnerability Management, and other security teams to contextualize threats, support investigations, and refine detection and response efforts.
  5. Draft, edit, and deliver finished intelligence products and briefings, including threat assessments, actor profiles, incident support reporting, and recurring intelligence updates.

Skills

Required

  • Cyber Threat Intelligence (CTI)
  • all-source analysis
  • threat actor TTPs
  • indicators of compromise (IOCs)
  • malware analysis fundamentals
  • structured analytic techniques
  • intelligence cycle
  • Diamond Model
  • Cyber Kill Chain
  • MITRE ATT&CK framework
  • information security
  • security operations
  • incident response
  • threat hunting
  • digital investigation tools (e.g., VirusTotal, Maltego)
  • online research skills
  • verbal communication
  • written communication
  • presentation skills

Nice to have

  • Cyber Security degree
  • Intelligence Studies degree
  • Security Studies degree
  • International Relations degree
  • Political Science degree
  • Computer Science degree
  • vendor sources
  • peer communities
  • security investigations
  • Reverse Engineering
  • Threat Management
  • Vulnerability Management
  • Threat Intelligence Engineering

What the JD emphasized

  • 3+ years of experience in information security, preferably in cyber threat intelligence, security operations, incident response, threat hunting, malware analysis, or another investigative cyber role
  • Experience tracking cybercriminal, nation-state, high-grade, or other cyber threat actors
  • Extensive experience producing intelligence products and briefings
  • Demonstrated ability to collect, analyze, synthesize, and interpret qualitative and quantitative data from multiple sources
  • Experience applying analytic frameworks and methodologies such as the intelligence cycle, Diamond Model, Cyber Kill Chain, MITRE ATT&CK, and structured analytic techniques