Job Openings Jr. Threat Intelligence Analyst

About the job Jr. Threat Intelligence Analyst

As a Threat Intelligence Analyst, you will research and analyze emerging cyber threats, produce concise analyst notes, and communicate findings to both technical and non-technical audiences. You will use open-source intelligence (OSINT) and internal tools such as the Recorded Future Intelligence Cloud to inform clients and internal stakeholders of the latest cyber threat activities, ensuring timely and actionable insights.


Key Responsibilities:
Research & Analysis

  • Conduct in-depth research on cyber threat events, using OSINT sources and the
    Recorded Future Intelligence Cloud.
  • Identify and assess trending cyberattacks, including ransomware, phishing,
    software vulnerability exploitation, and other emerging threats.
  • Map identified threats to frameworks such as MITRE ATT&CK and the diamond
    model of intrusion analysis.

Reporting & Writing

  • Produce analyst notes referencing both open-source and internal intelligence,
    adhering to a clear, technical writing style.
  • Ensure reports are concise, informative, and appropriately tailored for defenders,
    technical teams, and non-technical stakeholders.
  • Publish analyst notes to the Recorded Future Intelligence Cloud, including all
    relevant entities (e.g., threat actors, malware, TTPs, MITRE IDs).

Collaboration & Communication

  • Work closely with global Threat Intelligence Analyst teams (Philippines, Australia,
    UK, US) to refine and validate findings.
  • Engage in team meetings to share updates, discuss guidance changes, and
    participate in ongoing training.
  • Provide ad-hoc support or additional coverage as needed by the business.

Process & Best Practices

  • Accurately document and interpret raw data, mapping it to recognized threat
    intelligence frameworks.
  • Maintain up-to-date knowledge of the cyber threat landscape and emerging trends.
  • Contribute to process improvements and share learnings/best practices within the
    team.


Must Have Qualifications

  • At least one (1) year of professional experience in cybersecurity, cyber threat intelligence, or a closely related field, OR At least two (2) years of professional experience in technical writing, due diligence, risk assessments, physical threat intelligence, fraud intelligence, or any role requiring substantial report writing.
  • Solid understanding of basic cyber threats (e.g., malware, phishing, trojans, botnets).
  • Familiarity with OSINT research techniques and sources.
  • Ability to accurately interpret raw data and translate it into clear, coherent reports.
  • Excellent English-language grammar and reading comprehension.
  • Strong verbal communication skills in English.
  • Demonstrable ability to produce structured, concise, and accurate written analysis tailored to different audiences.
  • Strong attention to detail and accuracy.
  • Curiosity-driven approach to research and problem-solving.
  • Ability to thrive in a collaborative, fast-paced environment.
  • Flexibility to work different shifts, including possible night shifts, as required by the business.
  • Strong organizational skills to handle multiple projects and deadlines.

Desirable (Nice to Have)

    • Prior hands-on experience with threat intelligence platforms or feeds.
    • Familiarity with applying frameworks such as MITRE ATT&CK, the diamond model, CVE standards, and/or the cyber kill chain.
    • Up-to-date awareness of current trends and ongoing developments in cybersecurity and the broader threat landscape.
    • Ability to propose actionable mitigations or defensive strategies based on threat intelligence findings.
    • Special interest and demonstrated understanding of cybersecurity issues throughout Latin America
    • In-depth knowledge of popular news sources, including technical publications, throughout Latin America.
    • Relevant cybersecurity or threat intelligence certifications (e.g., Security+, CySA+, GCTI, GCIA, CISSP, etc.).