CrawlJobs Logo

Lead Threat Intelligence Analyst

take2games.com Logo

Take-Two Interactive Software, Inc.

Location Icon

Location:
United States, New York

Category Icon
Category:
IT - Administration

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

133900.00 - 198160.00 USD / Year

Job Description:

We are looking for a Lead Threat Intelligence Analyst. In this role, you'll be at the forefront of our defense, leading efforts to identify, analyze, and counter emerging security threats. You'll work closely with various security & technology teams to strengthen our defenses and provide actionable intelligence to protect our organization. Your expertise will directly contribute to safeguarding Take-Two and its labels systems, networks, and data.

Job Responsibility:

  • Lead the design, development, and continuous improvement of the organization’s cyber threat intelligence (CTI) program
  • Perform deep-dives into cyber threats, including analyzing malware, understanding adversary tactics, techniques, and procedures (TTPs), and tracking threat actor groups
  • Create and refine threat models and frameworks to predict and prepare for potential attacks
  • Work with our Global Security Operations Center (GSOC), Detection Engineering, Automation Engineers and Incident Response teams to integrate threat intelligence into our detection and prevention systems
  • Generate timely and high-quality intelligence/Threat Landscape reports, risk forecasts and alerts for technical and executive audiences
  • Promote automation of indicator ingestion, correlation, and dissemination across GSOC, Automation and IR platforms
  • Define and track key performance indicators (KPIs) for the threat intelligence program
  • Conduct periodic maturity assessments of the threat intelligence function
  • Provide guidance and mentorship to junior analysts

Requirements:

  • At least 5-7 years of experience in cybersecurity
  • Minimum of 3 years in a dedicated threat intelligence role
  • Strong understanding of the cyber threat landscape, including knowledge of threat actor groups, common attack vectors, and malware families
  • Proven ability to analyze complex data from various sources (e.g., open-source intelligence, dark web forums, technical reports) to form a cohesive threat picture
  • Familiarity with common threat intelligence frameworks like MITRE ATT&CK, the Cyber Kill Chain, and Diamond Model
  • Excellent written and verbal communication skills, with the ability to present technical information clearly to both technical and non-technical audiences
  • Experience with threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and forensic tools

Nice to have:

  • Insider threat knowledge
  • Relevant industry certifications such as GIAC GCTI, GREM, or other certifications from organizations like ISC2 or CompTIA
  • Proficiency in scripting languages (e.g., Python, PowerShell) to automate data collection and analysis tasks
  • Experience with vulnerability analysis, exploit development, or reverse engineering
  • Prior experience leading a small team or a project
What we offer:
  • Medical (HSA & FSA)
  • dental
  • vision
  • 401(k) with company match
  • employee stock purchase plan
  • commuter benefits
  • in-house wellness program
  • broad learning & development opportunities
  • a charitable giving platform with company match
  • Fitness allowance
  • employee discount programs
  • free games & events
  • stocked pantries
  • 14 paid holidays per calendar year
  • paid vacation time per calendar year (ranging from 15 to 25 days) or eligibility to participate in the Company’s discretionary time off program
  • up to 10 paid sick days per calendar year
  • paid parental and compassionate leave
  • wellbeing programs for mental health and other wellness support
  • family planning support through Maven
  • reimbursements for fitness-related expenses

Additional Information:

Job Posted:
December 12, 2025

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Lead Threat Intelligence Analyst

Lead Threat Intelligence Analyst

We are looking for a Lead Threat Intelligence Analyst. In this role, you'll be a...
Location
Location
Canada , Toronto
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5-7 years of experience in cybersecurity
  • Minimum of 3 years in a dedicated threat intelligence role
  • Strong understanding of the cyber threat landscape, including knowledge of threat actor groups, common attack vectors, and malware families
  • Proven ability to analyze complex data from various sources
  • Familiarity with common threat intelligence frameworks like MITRE ATT&CK, the Cyber Kill Chain, and Diamond Model
  • Excellent written and verbal communication skills
  • Experience with threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and forensic tools
Job Responsibility
Job Responsibility
  • Lead the design, development, and continuous improvement of the organization’s cyber threat intelligence (CTI) program
  • Perform deep-dives into cyber threats, including analyzing malware, understanding adversary tactics, techniques, and procedures (TTPs), and tracking threat actor groups
  • Create and refine threat models and frameworks to predict and prepare for potential attacks
  • Work with our Global Security Operations Center (GSOC), Detection Engineering, Automation Engineers and Incident Response teams to integrate threat intelligence into our detection and prevention systems
  • Generate timely and high-quality intelligence/Threat Landscape reports, risk forecasts and alerts for technical and executive audiences
  • Promote automation of indicator ingestion, correlation, and dissemination across GSOC, Automation and IR platforms
  • Define and track key performance indicators (KPIs) for the threat intelligence program
  • Conduct periodic maturity assessments of the threat intelligence function
  • Provide guidance and mentorship to junior analysts
What we offer
What we offer
  • Medical (HSA & FSA), dental, vision
  • 401(k) with company match
  • Employee stock purchase plan
  • Commuter benefits
  • In-house wellness program
  • Broad learning & development opportunities
  • A charitable giving platform with company match
  • Fitness allowance
  • Employee discount programs
  • Free games & events
  • Fulltime
Read More
Arrow Right

Lead Threat Intelligence Analyst

We are looking for a Lead Threat Intelligence Analyst. In this role, you'll be a...
Location
Location
United States , Las Vegas
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5-7 years of experience in cybersecurity
  • Minimum of 3 years in a dedicated threat intelligence role
  • Strong understanding of the cyber threat landscape, including knowledge of threat actor groups, common attack vectors, and malware families
  • Proven ability to analyze complex data from various sources
  • Familiarity with common threat intelligence frameworks like MITRE ATT&CK, the Cyber Kill Chain, and Diamond Model
  • Excellent written and verbal communication skills
  • Experience with threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and forensic tools
Job Responsibility
Job Responsibility
  • Lead the design, development, and continuous improvement of the organization’s cyber threat intelligence (CTI) program
  • Perform deep-dives into cyber threats, including analyzing malware, understanding adversary tactics, techniques, and procedures (TTPs), and tracking threat actor groups
  • Create and refine threat models and frameworks to predict and prepare for potential attacks
  • Work with our Global Security Operations Center (GSOC), Detection Engineering, Automation Engineers and Incident Response teams to integrate threat intelligence into our detection and prevention systems
  • Generate timely and high-quality intelligence/Threat Landscape reports, risk forecasts and alerts for technical and executive audiences
  • Promote automation of indicator ingestion, correlation, and dissemination across GSOC, Automation and IR platforms
  • Define and track key performance indicators (KPIs) for the threat intelligence program
  • Conduct periodic maturity assessments of the threat intelligence function
  • Provide guidance and mentorship to junior analysts
What we offer
What we offer
  • Medical (HSA & FSA)
  • dental
  • vision
  • 401(k) with company match
  • employee stock purchase plan
  • commuter benefits
  • in-house wellness program
  • broad learning & development opportunities
  • a charitable giving platform with company match
  • Fitness allowance
  • Fulltime
Read More
Arrow Right
New

Lead IT Threat Hunt Analyst

The Lead IT Threat Hunt Analyst proactively identifies and neutralizes cyber thr...
Location
Location
United States
Salary
Salary:
103700.00 - 134460.00 USD / Year
amtrak.com Logo
AMTRAK
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s Degree in Computer Science, Information Systems, or related field
  • Professional security‐related certifications (e.g. GIAC Certified Forensic Analyst (GCFA), Certified Information Systems Security Professional (CISSP), or equivalent)
  • Enterprise security experience in threat intelligence, investigative and hunt methodologies, detection engineering, security operations and/or incident response
  • Knowledge of Mitre ATT&CK matrices (Enterprise, ICS, Cloud) to map adversary tactics, techniques and procedures (TTPs) and inform structured hunts
  • Knowledge of OS triage artifact analysis and incident investigative methods
  • Strong analytical skills and proficiency with SIEM, EDR, CASB, IDS/IPS, AV, DLP UEBA, FW, and forensic investigative technologies
  • Ability to design and review multi-source correlation queries using Kusto, Kibana and/or Structured query languages, across endpoint, cloud, network, application and identity data
Job Responsibility
Job Responsibility
  • Conduct proactive, intelligence-driven threat hunts to identify adversary activity, cyber risks and anomalies, identifying and investigating potential threats to critical infrastructure and operations
  • Evaluate, analyze and synthesize large quantities of data to uncover anomalous activity capable of introducing risk to Amtrak environments
  • Search for potential vulnerability exploitation, post-compromise activity or security control gaps based on emerging and known adversary tactics, techniques and procedures (TTPs), user behavior, endpoint threat detection, network behavior analytics, machine learning-derived trends and external threat reports
  • Review EDR telemetry, Firewall, IDS/IPS logs, web content filtering logs, net flow device logs, antivirus logs
  • Work closely with other cybersecurity teams (detection engineering, threat intelligence, incident response and security operations) and operational technology service owners to escalate anomalous findings, contribute to detection logic improvements and verify security control implementations
  • Support and participate in formal reporting related to threat hunt findings, implementation of security controls and improvements to Cyber Security Operations processes
  • Capture hunt byproducts indicative of poor cyber hygiene practices, company policy violation or misuse
  • support incident investigations, as needed
  • Participate in the evaluation and recommendation of hardware and software systems that provide security functions
  • Respond and resolve problems, security incidents and forensic investigations, as needed
What we offer
What we offer
  • health, dental, and vision plans
  • health savings accounts
  • wellness programs
  • flexible spending accounts
  • 401K retirement plan with employer match
  • life insurance
  • short and long term disability insurance
  • paid time off
  • back-up care
  • adoption assistance
  • Fulltime
Read More
Arrow Right

Cyber Threat Deputy Lead

AnaVation is seeking a Cyber Threat Deputy Team Lead to join our team and suppor...
Location
Location
United States , Reston
Salary
Salary:
Not provided
anavationllc.com Logo
AnaVation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI Clearance
  • Bachelor’s degree in relevant field and 8-10 years of experience related to specific functional area (May substitute Master’s degree in lieu of 2 years of experience)
  • CompTIA Security+ or equivalent IAT Level II and currently hold or able to obtain CSSP Analyst certification (such as CySA+ or equivalent)
  • Managing/Leading small team
  • Experience working with reporting, automation, and visualization systems to provide situational awareness and making recommendations to improve cyber threat intelligence and fusion capabilities
  • Experience creating, reviewing, and delivering finished intelligence products
  • Experience working collaboratively with staff at all experience levels to deliver short-term, medium-term, and long-term commitments
Job Responsibility
Job Responsibility
  • Supervise the creation of analytical products based on cyber threat intelligence and analysis to clearly document significant cyber-attacks or the discovery of new vulnerabilities
  • Coaching, mentoring, and guiding the efforts of 6-8 team members with collectively building higher value fusion products, expanding effective lines of communication, briefing senior and very senior customer leadership, and leaning on the active edge of information flow
  • Supervise 6-8 members conducting research and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to US and DoD information networks
  • Analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent
  • Develop technical solutions to complex problems
  • Exercises considerable latitude in determining objectives and approaches to assignment
What we offer
What we offer
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance
  • Fulltime
Read More
Arrow Right

Cyber Threat Analyst

AnaVation is seeking a Cyber Threat Analyst to join our team and support our mis...
Location
Location
United States , Reston
Salary
Salary:
Not provided
anavationllc.com Logo
AnaVation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI Clearance
  • Bachelor’s degree in relevant field and 1-8 years of experience related to specific functional area (May substitute Master’s degree in lieu of 4 years of experience)
  • CompTIA Security+ or equivalent IAT Level II and currently hold or able to obtain CSSP Analyst certification (such as CEH, CySA+, CFR)
  • Working collaboratively across cross-functional teams of all experience levels
  • Experience working collaboratively with staff at all experience levels to deliver short-term, medium-term, and long-term commitments
  • Experience completing and coordinate tasks across cross-functional teams in either a lead or supporting role
  • Ability to provide recommendations for enhancing views of device data in bulk and to view associations of all the data related to those devices
  • Experience leading, developing, and delivering inter-discipline and inter-organizational capabilities and processes to improve performance
  • Technical understanding of classified networks, servers, storage, operating systems, applications, and the full stack of supporting technologies
  • Experience working with reporting, automation, and visualization systems to provide situational awareness and making recommendations to improve cyber threat intelligence and fusion capabilities
Job Responsibility
Job Responsibility
  • Create analysis products based on cyber threat fusion to clearly document significant cyber-attacks or the discovery of new vulnerabilities
  • Focus on collectively building higher value fusion products, expanding effective lines of communication, knowing lanes of responsibility, and building trust in consistently improving capabilities
  • Conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks
  • Analyze network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent
  • Develops technical solutions to complex problems
  • Exercises considerable latitude in determining objectives and approaches to assignment
What we offer
What we offer
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance
Read More
Arrow Right

Security Intelligence Analyst

Figure is seeking a specialized and proactive Security Intelligence Analyst to j...
Location
Location
United States , San Jose
Salary
Salary:
105000.00 - 145000.00 USD / Year
figure.ai Logo
Figure
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4+ years of equivalent experience
  • Demonstrated experience in intelligence analysis, preferably within protective intelligence, executive protection, or related corporate security environments
  • Strong analytical, problem-solving, and organizational skills with the ability to assess threats specific to executive protection
  • Proficient in utilizing intelligence tools, incident management systems, CCTV, dispatch, and protective intelligence platforms to build POI profiles, case files, and investigative products
Job Responsibility
Job Responsibility
  • Monitor global events and provide real-time intelligence and oversight of Figure operations
  • Integrate internal and external intelligence sources to research, analyze, and aggregate threat data related to executive movements, public appearances, and exposure
  • Conduct protective intelligence assessments to identify individuals, groups, or movements posing potential threats to executives, utilizing research skills and behavioral threat analysis techniques
  • Provide direct intelligence support and coordinate with both in-house and third-party security teams, ensuring actionable threat assessments and real-time situational awareness
  • Utilize social media monitoring, Open Source Intelligence (OSINT), and specialized protective intelligence tools to track potential hostile surveillance, protests, threats, or emerging risks to executives and company operations
  • Compile and report on senior executive travel, including upcoming travel reports and daily executive travel briefings to ensure situational awareness
  • Conduct ad-hoc briefings for senior security leadership on unfolding events impacting executives
  • Develop specialized protective intelligence products such as Executive Threat Profiles, Event Risk Assessments, and Protective Travel Advisories
  • Coordinate with GSOC peers to align global incident responses, escalation procedures, and the dispatch of protective services, providing frontline leadership and infusing protective intelligence capabilities across the wider team
  • Serve as a trusted advisor and backup to the GSOC Lead, as needed
  • Fulltime
Read More
Arrow Right

Analyst Relations Lead

We are seeking a strategic, results-driven leader to manage and grow our Industr...
Location
Location
United States
Salary
Salary:
145000.00 - 192000.00 USD / Year
https://corelight.com/ Logo
Corelight
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8+ years of experience in analyst relations, public relations, or a related strategic communications role, with at least 5 years of experience in the cybersecurity industry
  • Proven track record of managing relationships with top-tier industry analysts (e.g., Gartner, Forrester, IDC, etc.) and influencing market perception through strong engagements
  • Deep understanding of the cybersecurity landscape, including key technologies, trends, and challenges such as network detection and response, threat intelligence, endpoint security, cloud security, and zero trust architecture
  • Exceptional written and verbal communication skills
  • Strong analytical skills and the ability to synthesize market data, analyst feedback, and competitive information
  • Proven ability to collaborate effectively with cross-functional teams
  • Skilled in managing difficult situations and turning negative feedback or challenging reports into opportunities
  • Bachelor’s degree in Communications, Marketing, Public Relations, or a related field
  • advanced degrees (MBA, Master’s) or certifications (e.g., APR, IABC) are a plus
Job Responsibility
Job Responsibility
  • Develop and execute a comprehensive industry analyst relations strategy
  • Cultivate and maintain strong relationships with key analysts
  • Monitor and assess industry trends and analyst reports
  • Lead regular interactions, briefings, and deep-dive sessions with analysts
  • Collaborate with executives, product, and marketing teams to create compelling narratives
  • Drive participation in key industry evaluations
  • Track and analyze competitors’ positioning and performance in analyst reports
  • Provide regular updates to the executive team
  • Act as a key point of contact for managing any analyst-related issues
  • Fulltime
Read More
Arrow Right

Lead Cybersecurity Operations Integration Analyst

If you’re looking for a career that will help you stand out, join HSBC and fulfi...
Location
Location
India , Hyderabad
Salary
Salary:
Not provided
https://www.hsbc.com Logo
HSBC
Expiration Date
December 31, 2025
Flip Icon
Requirements
Requirements
  • Knowledge and demonstrated experience of common cybersecurity technologies such as
  • IDS / IPS / HIPS, AV, EDR, Firewalls, Proxies etc.
  • Knowledge of common network protocols such as TCP, UDP, DNS, DHCP, IPSEC, HTTP, etc. and network protocol analysis suits
  • Excellent knowledge of common enterprise technology infrastructure, platforms and tooling, including
  • Windows, Linux, infrastructure management and networking hardware
  • Some technical experience of 3rd party cloud computing platforms such as AWS, Azure and Google their associated security tooling/platforms
  • Knowledge and demonstrated experience in incident response tools, techniques and process for effective threat containment, mitigation and remediation
  • Knowledge and demonstrated experience of common log management suites, Security Information and Event Management (SIEM)tools such as Splunk Enterprise Security or Microsoft Sentinel
  • Knowledge of cloud based 'data lake' solutions used for the collection and real-time advanced analysis of security information
  • Ability to identify, develop and track key performance indicator (KPI) and key control indicator (KCI) metrics for accurate and contextual evaluation of operational effectiveness as well as providing recommendations for control improvement and mitigating control adjustments
Job Responsibility
Job Responsibility
  • Supporting the technical development, implementation and maintenance of a technology and log ingestion framework that aligns to control requirements and supports a cyber-threat intelligence led approach to the detection, response and containment of cyber-threats
  • Supporting and maintaining the technical aspects of a flexible stakeholder engagement model that caters for both proactive and reactive collaboration and can rapidly adjust and reprioritise workloads in response to the changing threat-landscape
  • Contributing to the building and maintaining strong processes and collaborative working practices with supporting teams in Sustainable Cybersecurity Operations and the wider Global Cybersecurity Operations & Intelligence teams
  • Building relationships and engagements with the many technology and platform owner stakeholders
  • Successfully maintaining these relationships and delivering prioritised outcomes in an environment where relationships can be complex and priorities are often divergent
  • Maintaining governance across all Cyber Ops Integration activities and ensuring the creation, collection and processing of key data points to feed into relevant service reporting e.g. service delivery metrics, KPIs, KCIs, and performance dashboards
  • Supporting the development and maintenance of a functional strategy that supports continuous improvement and is aligned to the wider Sustainable Cybersecurity Operations and Global Cybersecurity Operations & Intelligence strategy and goals
What we offer
What we offer
  • Continuous professional development
  • Flexible working
  • Opportunities to grow
  • Inclusive and diverse environment
  • Fulltime
Read More
Arrow Right
Welcome to CrawlJobs.com
Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.