Search by job, company or skills

GSPANN Technologies, Inc

Threat Intelligence Analyst

new job description bg glownew job description bg glownew job description bg svg
  • Posted 24 days ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Security Operations Center (SOC), Microsoft Sentinel, Microsoft Defender Suite, Cribl, Threat Hunting, Security Orchestration, Automation & Response (SOAR)

Description

GSPANN is hiring a Threat Intelligence Analyst to monitor emerging cyber threats, adversary campaigns, and zero-day vulnerabilities. The role focuses on operationalizing threat intelligence into Microsoft Sentinel, Defender, Cribl, and SOAR workflows to strengthen detection, hunting, and incident response.

Location: Hyderabad

Role Type: Full Time

Published On: 18 February 2026

Experience: 8 - 10 Years

Share this job

Description

GSPANN is hiring a Threat Intelligence Analyst to monitor emerging cyber threats, adversary campaigns, and zero-day vulnerabilities. The role focuses on operationalizing threat intelligence into Microsoft Sentinel, Defender, Cribl, and SOAR workflows to strengthen detection, hunting, and incident response.

Role and Responsibilities

  • Track emerging threats, adversary campaigns, malware families, and zero-day vulnerabilities on a continuous basis.
  • Monitor OSINT sources, dark web forums, vendor threat reports, and commercial threat intelligence feeds.
  • Identify threat trends that increase organizational risk exposure.
  • Collect, validate, enrich, and prioritize Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs).
  • Maintain structured threat intelligence repositories and ensure data accuracy.
  • Push validated intelligence into Microsoft Sentinel, SOAR playbooks, detection rules, and L3 investigation teams.
  • Correlate intelligence with SOC alerts and active investigations to provide stronger attribution and context.
  • Enrich investigations with attacker context such as campaigns, malware, TTPs, infrastructure, regions, and motivations.
  • Improve triage efficiency and reduce investigation time through actionable intelligence inputs.
  • Partner with L3 analysts and detection engineers to identify detection gaps and coverage issues.
  • Recommend new detection rules, hunting queries, and alert logic based on intelligence findings.
  • Support proactive threat hunts by providing attack hypotheses, MITRE ATT&CK mapping, and IOC collections.
  • Produce tactical (IOC-based), operational (campaign-level), and strategic (trend-level) intelligence reports.
  • Deliver periodic threat briefings to SOC teams, IT leadership, and executive stakeholders.
  • Provide risk-based recommendations to strengthen mitigation and preparedness.
  • Collaborate with SOC leadership, Incident Response teams, Red Teams, and detection engineering teams.
  • Feed intelligence into incident response workflows and support mitigation planning.
  • Escalate time-sensitive and high-risk threats to SOC leadership and L3 teams.
  • Perform adversary threat modeling aligned to organizational assets and threat exposure.
  • Prioritize threats based on business impact, exploitability, and attacker capability.
  • Align intelligence assessments with MITRE ATT&CK and industry threat frameworks.
  • Measure intelligence effectiveness by tracking improvements in detection outcomes and SOC performance.
  • Maintain and improve intelligence SOPs, workflows, and enrichment processes.
  • Continuously update intelligence lifecycle processes to reflect evolving threats and attacker techniques.

Skills And Experience

  • Strong expertise in threat intelligence methodologies and frameworks such as MITRE ATT&CK, Cyber Kill Chain, and Diamond Model.
  • Proven experience operationalizing threat intelligence in Microsoft Sentinel, including IOC ingestion, analytics rule updates, and KQL enrichment.
  • Hands-on understanding of Microsoft Defender telemetry across Endpoint, Identity, and Cloud.
  • Working knowledge of Cribl pipelines for log normalization, enrichment, and threat feed ingestion.
  • Ability to analyze malware families, adversary infrastructure, campaign behavior, and TTP evolution.
  • Strong capability to filter out spoofed, low-quality, and irrelevant threat intelligence.
  • Expertise in correlating threat intelligence with SOC alerts, incidents, and security telemetry.
  • Experience creating attacker profiles, campaign summaries, threat assessments, and risk scoring models.
  • Ability to support Incident Response and Threat Hunting teams with high-value intelligence artifacts.
  • Proficiency in Kusto Query Language (KQL) for enrichment and intelligence-driven hunting.
  • Experience with Threat Intelligence Platforms (TIPs), OSINT tools, malware sandboxes, and enrichment APIs.
  • Strong understanding of network, endpoint, cloud, and identity telemetry sources.
  • Excellent written and verbal communication skills to deliver executive-ready intelligence reports.
  • Ability to simplify technical intelligence into clear risk narratives for non-technical stakeholders.
  • Strong analytical thinking, structured problem-solving, and attention to detail.
  • Strong collaboration skills across SOC, IR, Red Team, and leadership teams.
  • Certifications such as SC-200, SC-100, AZ-500, GCTI, CTIA, GIAC Cyber Threat Intelligence, GREM, and Cribl Foundations/Admin are preferred.

More Info

Job Type:
Industry:
Function:
Employment Type:

Job ID: 143288479