Threat Intelligence Analyst
Typically requires 3 to 5 years of experience in trending, threat analysis, and report writing.

A threat intelligence analyst safeguards computer networks and systems by identifying threats through information collection and intelligence analysis. They analyze threats, techniques, tactics, and procedures of threat actors; produce written, actionable intelligence on current and developing threats; and support incident response, red team, and forensics efforts. Daily responsibilities of a threat intelligence analyst include:

  • Analyzing intelligence, to include open source research to understand risks and threats.
  • Understanding political and current affairs and their impact on security risks.
  • Understanding advanced persistent threats, actors, and infrastructure.
  • Producing intelligence reports and threat assessments for internal Security Operations Center (SOC) consumption and delivery to management.
  • Conducting investigations and supporting incident response.
Salary range (US data)
Job openings
Created with Sketch. 19%
Job growth
Mahmoud Salem
Sr. Cyber Security Intelligence Analyst
Mahmoud has been working as a threat intelligence analyst after years of working in political risk assessment.
Mahmoud Salem
Sr. Cyber Security Intelligence Analyst, DCSO Deutsche Cyber Sicherheitsorganisation GmbH
Mahmoud currently works as a threat intelligence analyst, leveraging his experience in political risk assessment and business and human intelligence for a number of local and international organizations.
My job is in the intersection of policy, current affairs, technology, financial crimes, computational propaganda, and geopolitical conflict, and its scope changes and gets bigger with every passing day. It is the coolest job in the world.
We had a chance to connect with Mahmoud to ask him a few questions about his cybersecurity journey.
Start the journey to become a Threat Intelligence Analyst

Get Started with Threat Intelligence

Prepare for a career as a threat intelligence analyst.

~1 hr
Top skills requested
The technical and specialized skills most frequently requested by employers for this role.
  • Threat intelligence
  • Threat analysis
  • Information security
  • Security operations
  • Programming languages
  • Intelligence analysis
  • Security information and event management (SIEM) tools.
  • Malware analysis
  • Computer forensics
  • Operating systems
  • Penetration testing
The business skills most frequently requested by employers for this role.
Teamwork 29% Writing 30% Communication Skills 40% Research 61%
Note: Percentages refer to the rate at which this skill appears in job postings
In partnership with the World Economic Forum.