Role of a Cyber Threat Intelligence Analyst

Every year thousands of new malware and vulnerabilities are introduced into business environment. Companies need to stay abreast of all of this new information in order to be effective in implementing proactive security. In order to meet this need, a fairly new field in Cyber Security has evolved known as Cyber Threat Intelligence. The most common position in this field is Cyber Intelligence Analyst or Cyber Threat Analyst.

What is a Cyber Intelligence Analyst?

A Cyber Intelligence Analyst are security professional who use their knowledge of cybersecurity and their skills in intelligence gathering to develop cyber security strategy that can implemented by the company. As an analyst you will be expected to do technical research to collect information about new malware, related criminal activities and the groups/individuals behind them. Next you will be expected to take that information and perform intelligence analysis, which is where you made predictions about future activities based on what you found during your research. Lastly, you will be expected to create threat intelligence reports that communicate the results of your findings to the relevant stakeholders and occasionally present reports to senior level management to keep them informed of the threats in the environment.

Educational Requirements:

In order to pursue a career in Cyber Threat Intelligence hiring managers will be looking for you to have at least a Bachelor’s degree in Information Technology, Computer science or a similar field. In addition to a Bachelor’s degree certifications are another way of demonstrating your knowledge and commitment to the field. Some of the best certifications for an analyst level position include:

  • CISSP (Certified Information Systems Security Professional)
  • Security+
  • ISSEP (Information Systems Security Engineering Professional)


Technical Skills:

Someone interested in being a Cyber Threat Analyst should have Knowledge/Experience in these areas:

  • Firewalls
  • Network and Operating System Security
  • Intrusion Detection and Intrusion Prevention Systems
  • Deep/Dark Web

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s