Qureos

Find The RightJob.

Cyber Threat Intelligence Analyst

Contract on 1099

# of Open Positions: 1

Length of Contract: 12 Months

Position Overview:
The Senior Cyber Threat Intelligence (CTI) Analyst will serve as a strategic force multiplier in protecting CLIENT's infrastructure by identifying, analyzing, and contextualizing cyber threats before they materialize into operational impact. This role requires a forward-leaning, highly analytical professional who can synthesize technical indicators, adversary behaviors, and geopolitical developments into actionable intelligence that informs security operations and leadership decision-making across CLIENT's stakeholders and enterprise environments.

The ideal candidate brings prior experience working within a Cyber Security Operations Center (CSOC), providing a strong foundation in security monitoring, incident escalation, and operational workflows. However, this position is intentionally designed as a progression beyond traditional SOC analyst responsibilities. Success in this role depends on the ability to move from reactive alert handling to proactive threat analysis, intelligence production, and strategic insight bridging the gap between real-time security operations and long-term threat awareness. The Senior CTI Analyst will partner closely with SOC, incident response, and engineering teams to ensure intelligence is relevant, timely, and operationally meaningful.

Key Responsibilities:

  • 10+ years of Threat Intelligence Collection & Analysis.
  • Gather, analyze, and correlate data from multiple sources (open-source, commercial feeds, ISACs, government advisories) to identify emerging threats.
  • Produce tactical, operational, and strategic intelligence reports for internal stakeholders.
  • Geopolitical & Regional Threat Monitoring.
  • Track geopolitical events and conflicts that may impact critical transportation infrastructure.
  • Assess how global and regional developments influence cyber threat actors targeting North American transportation networks.
  • Critical Infrastructure Protection.
  • Identify and assess threats specific to transportation systems, including rail, subway, and supporting operational technology (OT).
  • Collaborate with internal teams to provide intelligence-driven recommendations for risk mitigation.
  • Threat Actor Profiling & Campaign Tracking.
  • Monitor and analyze activities of nation-state actors, cybercriminal groups, and hacktivists targeting transportation and critical infrastructure sectors.
  • Maintain profiles of adversaries, their tactics, techniques, and procedures (TTPs) aligned with MITRE ATT&CK framework.
  • Collaboration & Information Sharing.
  • Engage with industry peers, ISACs, and government agencies to share intelligence and best practices.
  • Support incident response teams with contextual intelligence during active investigation.
  • Reporting & Briefing.
  • Deliver timely intelligence briefings to leadership and operational teams.
  • Create dashboards and reports highlighting threat trends, vulnerabilities, and risk assessments.

SPECIAL REQUIREMENTS:
East Coast / EST Operating Hours & Candidates preferred in NYC Metro area.

Work Hours: M-F: 35-40 hrs/wk with Normal Business Hrs

Work location: New York, NY, 10004

Job Types: Full-time, Contract

Pay: $50.00 - $65.00 per hour

Benefits:

  • Professional development assistance

Application Question(s):

  • Gather, analyze, and correlate data from multiple sources (open-source, commercial feeds, ISACs, government advisories) to identify emerging threats ?
  • Collaborate with internal teams to provide intelligence-driven recommendations for risk mitigation ?
  • Please share your Work Authorization status here. Examples: US Citizen, Green Card Holder or US Permanent Resident, H1-B Visa, F1-OPT or F1-EAD, Pre-GC EAD, TN VISA, L1, B1, Asylum, etc. Unanswered question will auto-reject the application ?
  • Can you work on 1099 / Independent Contractor ? This is mostly REMOTE role in New York, NY but needs resource living in NYC Metro area.
  • Do you have a Bachelors or Masters degree in Technology or Engineering related or equivalent field ?
  • Assess how global and regional developments influence cyber threat actors targeting North American transportation networks
  • Identify and assess threats specific to transportation systems, including rail, subway, and supporting operational technology (OT) ?

Education:

  • Bachelor's (Preferred)

Experience:

  • Produce tactical, operational & strategic intel reports : 10 years (Required)
  • Monitor & analyz BAD actors, Cyber criminals targetng infra: 10 years (Required)
  • Deliver timely intel briefings to leadership & ops teams: 10 years (Required)

License/Certification:

  • Cybersecurity certs ? If so, please share by Stating. (Required)

Work Location: Hybrid remote in New York, NY 10004

© 2026 Qureos. All rights reserved.