What are the responsibilities and job description for the Threat Intelligence Analyst position at Cypress HCM?
Job Description
Job Description
Threat Intelligence Analyst
We have an exciting opportunity for a Threat Intelligence Analyst with the top leading multimedia and creative software company in the world using cutting-edge tools and technologies, including industry-leading AI and creative software, empower millions of users to achieve their creative and business goals.
Responsibilities :
Monitor the cyber threat landscape for emerging threats to Adobe's products, platforms, and customers.
Create scripts and tools to automate threat intelligence collection and enhance efficiency.
Gather and analyze threat intelligence from diverse sources including open-source intelligence (OSINT), commercial threat intelligence feeds, dark web monitoring, and threat intelligence platforms to identify patterns, trends, and potential threats relevant to Adobe.
Provide timely, actionable intelligence to internal stakeholders, including security operations, incident response, threat hunting, detection engineering, risk management, vulnerability operation center, and executive leadership.
Develop detailed threat actor profiles, risk assessments, and mitigation recommendations specific to Adobe's technology stack and customer ecosystem.
Share threat intelligence findings with cross-functional teams, enabling proactive risk management across Adobe’s products and services.
Skills and Experience :
Threat Analysis & Detection
Identification of Indicators of Compromise (IoCs) : Proficient in recognizing and validating malicious IPs, domains, file hashes, and registry keys.
Tactics, Techniques, and Procedures (TTPs) Analysis : Expertise in mapping adversary behaviors using the MITRE ATT&CK framework to understand attack vectors and predict potential threats.
Advanced Persistent Threat (APT) Profiling : In-depth knowledge of APT groups, their operational methodologies, tools, and geopolitical motivations.
Cybercrime Ecosystem Intelligence : Strong understanding of dark web marketplaces, threat actor infrastructures, ransomware groups, and emerging cybercriminal tactics, techniques, and procedures (TTPs).
Cybersecurity Tools & Technologies
Security Information and Event Management (SIEM) : Hands-on experience with platforms like Splunk, QRadar, and ArcSight for real-time threat detection, event correlation, and log analysis.
Threat Intelligence Platforms (TIPs) : Proficient in using MISP, ThreatQ, Recorded Future, and similar platforms for aggregating, analyzing, and operationalizing threat intelligence feeds.
Log Analysis & Event Correlation : Strong ability to analyze large datasets from diverse sources (firewalls, IDS / IPS, endpoints) to uncover hidden threats.
Vulnerability Management : Understanding CVEs, CVSS scoring, and patch management and familiarity with vulnerability scanning tools (e.g., Nexpose, Qualys)
Scripting & Automation
Programming & Scripting : Proficient in Python, PowerShell, and Bash for automating repetitive tasks, developing custom scripts, and parsing large volumes of threat data.
Data Extraction Techniques : Strong command of regular expressions (RegEx) for advanced data filtering, pattern recognition, and log parsing.
API Integration & Automation : Experience in working with RESTful APIs to automate data collection from open-source intelligence (OSINT) tools and internal security platforms.
Threat Feed Integration : Knowledge of STIX / TAXII protocols for automated sharing and ingestion of structured threat intelligence data across systems.
Soft Skills
Technical & Executive Reporting : Strong report-writing skills for delivering actionable threat intelligence to both technical stakeholders and executive leadership.
Effective Communication : Ability to articulate complex cyber threats clearly and concisely through presentations, dashboards, and briefings tailored to diverse audiences.
Cross-Functional Collaboration : Proven ability to work closely with CSIRT Operations, threat-hunting, Detection Engineering, Vulnerability Management, and other security stakeholders to enhance organizational security posture.
Critical Thinking & Problem-Solving : Strong analytical mindset to assess threat data, identify patterns, and develop strategic responses to emerging threats.
Education :
Bachelor’s Degree (Preferred) : Fields : Cybersecurity, Information Security, Computer Science, Information Technology, or related disciplines.
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution.
Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right.
Surveys & Data Sets
What is the career path for a Threat Intelligence Analyst?
Sign up to receive alerts about other jobs on the Threat Intelligence Analyst career path by checking the boxes next to the positions that interest you.