Senior Cyber Threat Intelligence Analyst
Link Group
⚲ Warszawa
190 - 190 PLN/h netto (B2B)
Wymagania
- Security
- URLScan.io
- Cybersecurity
- Shodan
- Virustotal
- GreyNoise
- DomainTools
Opis stanowiska
Role Overview: This role is responsible for driving intelligence-led cybersecurity operations by owning the full intelligence lifecycle — from structured data collection and enrichment to advanced analytical assessment and strategic intelligence sharing. The position plays a key role in strengthening the organization’s detection, prevention, and response capabilities through actionable, context-rich threat insights. Core Responsibilities: • Lead and continuously optimize the Cyber Threat Intelligence lifecycle, ensuring high-quality intelligence production and effective dissemination to relevant stakeholders. • Aggregate, validate, and correlate threat data from multiple open-source and commercial intelligence platforms, including VirusTotal, URLScan.io, GreyNoise, DomainTools, and Shodan, transforming raw indicators into meaningful intelligence. • Formulate and test threat hunting hypotheses by analyzing telemetry across endpoints, identity systems, cloud environments, and network infrastructure. • Monitor, attribute, and track threat actors and campaigns, identifying patterns, operational behaviors, and emerging adversary techniques. • Assess adversarial tactics and techniques in alignment with the MITRE ATT&CK framework and current global threat activity. • Conduct malware investigations to identify behavioral traits, cluster malicious artifacts, and enhance detection capabilities through enriched intelligence. • Collaborate closely with Tier 3 Analysts to support advanced threat hunting and incident response engagements. • Provide intelligence-driven input to the Vulnerability Management function to support risk-based prioritization and remediation strategies. • Translate intelligence findings into actionable detection rules, security use cases, and strategic recommendations. • Produce high-quality technical documentation, executive-ready summaries, and post-incident analytical reports. • Operate autonomously with strong analytical judgment while maintaining effective cross-team collaboration within Security. • Communicate complex technical intelligence clearly to both technical teams and business stakeholders, ensuring shared situational awareness and informed decision-making.