Cyber Threat Intelligence Analyst

IQUASAR LLC

Cyber Threat Intelligence Analyst

Los Angeles, CA
Full Time
Paid
  • Responsibilities

    iQuasar is seeking a mission-driven and detail-oriented Cyber Threat Intelligence (CTI) Analyst to support operations for one of our clients. In this high-impact role, you will be the frontline of technical threat analysis, translating complex intelligence into actionable indicators of compromise (IOCs) and attack patterns (IOAs) to safeguard the Port and its stakeholders from evolving cyber threats.

    You will be responsible for proactively collecting, analyzing, and disseminating tactical and operational intelligence related to adversary tactics, techniques, and procedures (TTPs). This role demands a sharp analytical mind, technical acumen, and a deep understanding of the global cyber threat landscape.

    Title: Cyber Threat Intelligence Analyst

    Location: Los Angeles, CA

    Key Responsibilities:

    Perform technical threat analysis to identify and produce IOCs and IOAs based on real-time intelligence.

    Leverage intelligence platforms and tools (e.g., Anomali) to monitor, analyze, and respond to security threats in support of 8x5 operations and after-hours escalation.

    Conduct open-source intelligence (OSINT) gathering using tools like Shodan, Maltego, PassiveTotal, and VirusTotal.

    Produce high-quality tactical, operational, and strategic intelligence reports for both internal teams and Port stakeholders.

    Monitor, track, and become the subject matter expert (SME) on known adversaries and threat actors; escalate intelligence on active or emerging threats.

    Apply analytic models including the Cyber Kill Chain, MITRE ATT&CK Framework, and Diamond Model to assess and report on cyber threat behavior.

    Work cross-functionally with incident response, SOC, IT, and security operations teams to provide intelligence support.

    Continuously improve detection logic and security controls by feeding intelligence back into detection engineering and threat hunting efforts.

    Triage and prioritize threats, focusing on serious, credible intelligence that could impact critical operations.

    Maintain detailed, clear documentation and contribute to evolving threat playbooks and response plans.

    Qualifications:

    3+ years of experience as a Cyber Threat Intelligence Analyst.

    Strong experience producing intelligence products for various levels of leadership and operational teams.

    Familiar with threat actor behavior, TTPs, and indicators tracking.

    Solid understanding of CTI frameworks and the full intelligence lifecycle.

    2+ years working with commercial CTI platforms (e.g., Anomali, Recorded Future, ThreatConnect).

    Experience with OSINT collection tools and techniques.

    Strong problem-solving, critical thinking, and analytical skills.

    Ability to communicate complex information clearly to both technical and non-technical stakeholders.

    Proven ability to work independently and collaboratively in a fast-paced, high-security environment.

    Familiarity with maritime or critical infrastructure sectors is a plus.