Cyber Threat Intelligence Analyst jobs in United States
cer-icon
Apply on Employer Site
company-logo

AIG · 15 hours ago

Cyber Threat Intelligence Analyst

American International Group, Inc. (AIG) is a leading global insurance organization. The Cyber Threat Intelligence Analyst will collect and analyze intelligence on cyber threats, producing reports and briefings, while working with an interdisciplinary team to enhance cybersecurity situational awareness.

BankingFinancial ServicesInsurance
check
H1B Sponsor Likelynote

Responsibilities

Collect, process, catalog, and document information using sources and tools available
Conduct deep-dive investigations into threat actors, TTPs, malware, phishing campaigns, and IOCs using OSINT, dark web, commercial feeds, and internal telemetry
Develop independently and support production of recurring intelligence reporting and briefings for various stakeholders within the organization
Produce concise written analysis and visual presentation of findings under deadlines, including both tactical and strategic assessments
Respond to requests for ad-hoc reporting and research topics from management as required
Maintain a knowledge base of threats to the organization’s business lines, regions, and technology stack
Work with various intelligence collection and reporting tools and frameworks to produce reports
Quickly understand and deliver on stakeholder requirements to produce intelligence that is relevant, timely, accurate, actionable, and appropriate for the audience
Mentor junior analysts to strengthen analytic tradecraft standards across the team and champion a culture of curiosity, critical thinking, and adversary awareness
Deal professionally with offensive, profane, and obscene materials encountered during the course of investigations and research

Qualification

Cyber threat intelligenceIntelligence analysis methodologiesMalware analysisThreat detection strategiesGeopolitical dynamicsIntelligence platformsSIEM experienceCommunication skillsResearch presentationProfessional networkingData analysisReverse engineeringForeign languagesTeam collaboration

Required

Bachelor's degree in cybersecurity, computer science, intelligence studies, or related discipline
2+ years of experience in cybersecurity, with at least 1+ years focused on cyber threat intelligence
Experience with using intelligence analysis methodologies and the threat intelligence lifecycle to distill raw information into actionable intelligence
Good understanding of global geopolitical dynamics and the ability to apply that knowledge to an information security context
Proven ability to understand and explain the behaviors of different types of sophisticated cyber adversaries including organized cybercriminal groups and state-sponsored groups
Strong knowledge of common threat actor tools, infrastructure, and malware families
Proven ability to translate complex information sets into specific recommendations and map adversary behavior to MITRE ATT&CK to develop intelligence-focused detection and mitigation strategies
Outstanding written and oral communication skills for both technical and executive audiences
Ability to prepare and present research findings in both virtual and in-person settings
Ability to work both independently and with a team of like-minded professionals to achieve reporting objectives and the ability to organize, track, and prioritize work
Ability to maintain or develop professional contacts in the cybersecurity community and in client industries including finance and government
Experience with conducting operations in closed/vetted online forums and marketplaces in both the surface and dark web spaces
Experience working in and defining intelligence requirements for private sector organizations, especially in a regulated industry (e.g., finance, insurance, healthcare, critical infrastructure)
Hands-on experience with intelligence platforms and tools (e.g., ThreatConnect, CrowdStrike, Mandiant, Anomali, Recorded Future, Silobreaker, Maltego)
Strong understanding of threat analysis and enterprise level mitigation strategies, including experience with SIEMs (e.g., Splunk, Sentinel, Falcon LogScale), EDR/XDR, and threat detection pipelines
Working knowledge of how malicious code operates and how technical vulnerabilities are exploited
Knowledge of operating systems, VPN technologies, Internet abuse issues, networking technologies, and other elements of enterprise networks and technology stacks
Knowledge of databases, query design, and how to analyze data thus obtained
Ability to safely triage and analyze malicious content using technologies like virtual machines, sandboxes, and browsing techniques to maintain strict operational security

Preferred

Hands-on reverse engineering or malware analysis experience is a plus
Knowledge of foreign languages is a plus

Benefits

Volunteer Time Off
Matching Grants Programs
Bonus in accordance with the terms of the applicable incentive plan
Total Rewards Program

Company

AIG is a global insurance company providing insurance products to support clients in business and in life.

H1B Sponsorship

AIG has a track record of offering H1B sponsorships. Please note that this does not guarantee sponsorship for this specific role. Below presents additional info for your reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2025 (2)
2024 (2)
2023 (4)
2022 (23)
2021 (5)
2020 (13)

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Kelly Lafnitzegger
Executive Vice President and Chief Human Resources Officer
linkedin
leader-logo
Charlie Fry
EVP, Reinsurance Purchasing and Risk Capital Optimization
Company data provided by crunchbase