Demo

Senior Cyber Threat Intelligence Specialist

NinjaOne
Connecticut, CT Contractor
POSTED ON 12/10/2025 CLOSED ON 12/19/2025

What are the responsibilities and job description for the Senior Cyber Threat Intelligence Specialist position at NinjaOne?

Description

About the Role

Join our Trust team as Senior Cyber Threat Intelligence Specialist (CTI) to turn raw intelligence into action. You will own our intelligence intake, tooling, and automations. Curate and enrich external and internal intel. Publish high-quality, actionable reporting that directly sparks hunts and new detections for our SOC (Security Operations Center) and DFIR (Digital Forensics and Incident Response) team. Partnering tightly with Detection Engineering, Incident Response, and Cloud Security to translate adversary TTPs into hypotheses, hunts, and durable detection content mapped to MITRE ATT&CK. If you love building signal pipelines as much as writing clear, decision-ready intel, then this role is for you.

Location - We are flexible on remote working from home, if you are located in the USA and reside in one of the following states - CA, CO, CT, FL, GA, *IL, KS, MA, MD, ME, NJ, NC, NY, OR, TN, TX, VA, and WA. We have physical offices in Austin, TX and Tampa, FL, if you prefer a hybrid option.

We hire the best software engineers, but experience in our stack can’t hurt: NinjaOne is built on Java, Kotlin, C , Golang and Postgres, supporting millions of user endpoints and running as a scalable cloud service in AWS. Knowing large-scale datastore bottlenecks, asynchronous application design and client-server architecture will help you.

What You’ll Be Doing

  • Intake, Curation & Enrichment- Operate and improve the CTI pipeline: aggregate, normalize, deduplicate, and score intel from commercial, open-source, ISAC/ISAO, and government feeds. Maintain PIRs (Priority Intelligence Requirements) with stakeholders and align reporting to those priorities. Enrich indicators and TTPs (WHOIS, passive DNS, sandboxing, URL/file reputations) and track adversary infrastructure changes over time.
  • Tooling & Automations- Own our TIP/TAXII ecosystem (e.g., MISP/OpenCTI or similar): uptime, schemas, tagging, TLP handling, data lifecycles, and automation jobs. Build/maintain ETL and enrichment automations (Python/PowerShell, serverless jobs, or pipelines) to reduce manual toil and noise. Integrate intel with SOC tooling (e.g., SIEM/EDR/SOAR) so hunts and detections stay fresh and relevant.
  • Actionable Reporting- Publish flash alerts, weekly intel briefs, and deep-dive actor/TTP reports with clear “so-what” and concrete actions for SOC/DFIR. Convert intel into hunt packages: hypotheses, data sources, SPL/KQL/Sigma starting points, and validation steps. Partner with Detection Engineering to propose new rules, hardening opportunities, and coverage mappings to ATT&CK/D3FEND.
  • Collaboration & Governance- Work side-by-side with SOC/DFIR during active incidents to provide rapid context (infrastructure pivots, likely next moves, IOCs). Establish sharing norms (TLP, NDA, distribution lists) and ensure compliant handling of sensitive intel. Track efficacy: closing the loop on which reports triggered hunts, detections adopted, and risk reduced.
  • Other duties as needed

About You

  • Bullets on Education requirements or preferences, Required or suggested experience, Technical Skills, Cross functional partners
  • CTI Core: Proven experience producing actionable intel (flash notes to deep dives) tied to SOC/DFIR outcomes.
  • Frameworks: Strong grasp of MITRE ATT&CK (and ideally D3FEND) for mapping intel to hunts/detections.
  • Tooling: Hands-on with a TIP/TAXII platform (MISP/OpenCTI or similar) and integrating intel into SIEM/EDR/SOAR.
  • Automation: Comfortable scripting (Python preferred) for ETL, enrichment, and API integrations; basic SQL/log querying.
  • Communication: Excellent writing and visualization skills—concise “so-what,” clear action items, audience-appropriate tone.
  • Ops Mindset: Pragmatic prioritization, PIRs discipline, and respect for TLP and legal/contractual boundaries.
  • English: Near-fluent (C1 ) with strong cross-functional communication.
  • You will stand out if you have expertise in:
    • Experience translating TTPs into Sigma/SPL/KQL starting points or YARA/EDR detection ideas.
    • Familiarity with sandboxing and malware triage; comfort interpreting network and endpoint artifacts.
    • Cloud familiarity (AWS) and common security logs for hunts/detections.
    • Relevant certs (e.g., GCTI, GOSI, GCIA, GCFA, AWS Security, SSCP/CISSP) or equivalent hands-on work.
About Us

NinjaOne automates the hardest parts of IT to deliver visibility, security, and control over all endpoints for more than 30,000 customers. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support. NinjaOne is #1 on G2 in endpoint management, patch management, remote monitoring and management, and mobile device management.

What You’ll Love

We are a collaborative, kind, and curious community.

We honor your flexibility needs with full-time work that is hybrid remote.

We have you covered with our comprehensive benefits package, which includes medical, dental, and vision insurance.

We help you prepare for your financial future with our 401(k) plan.

We prioritize your work-life balance with our unlimited PTO.

We reward your work with opportunities for growth and advancement.

Additional Information

This position is NOT eligible for Visa sponsorship. Due to federal government security requirements associated with our FedRAMP-authorized environment, candidates must be U.S. citizens or lawful permanent residents.

  • Due to operational policies, NinjaOne is unable to hire for this role within the city limits of Chicago. We will consider all qualified candidates who reside outside of the city properly or are willing to self-relocate.

Starting pay for the successful applicant depends on a variety of job-related factors, including but not limited to location, market demands, experience, job-related knowledge, and skills. The benefits available for this position include medical, dental, vision, 401(k) plan, life insurance coverage and PTO. For roles based in California, Colorado, Maryland, New Jersey, or Washington the base salary hiring range for this position is $140,000 to $210,000 per year.

For roles based in New York, the base salary hiring range for this position is $140,000 to $210,000 per year.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, genetic information, marital status, veteran status, or any other status protected by applicable law. We are committed to providing an inclusive and diverse work environment.

#BI-Remote

#BI-Hybrid

Salary : $140,000 - $210,000

Cyber Threat Intelligence Analyst (On-Site)
Nightwing Intelligence Solutions, LLC -
Arlington, VA
Cyber Threat Intelligence Analyst (On-Site)
Nightwing Intelligence Solutions, LLC -
Boulevard, VA
Senior Cyber Threat Intelligence Analyst
AIG -
Reston, VA

If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a Senior Cyber Threat Intelligence Specialist?

Sign up to receive alerts about other jobs on the Senior Cyber Threat Intelligence Specialist career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$125,027 - $157,872
Income Estimation: 
$149,432 - $188,965
Income Estimation: 
$99,793 - $130,112
Income Estimation: 
$125,027 - $157,872
This job has expired.
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at NinjaOne

  • NinjaOne Austin, TX
  • Description Director of Enterprise Infrastructure About The Role As the Director of Enterprise Infrastructure at NinjaOne, you will lead the strategy, exec... more
  • 13 Days Ago

  • NinjaOne Austin, TX
  • Description About the Role The Engagement & Events Coordinator is responsible for designing, planning, and executing a wide range of social giving and empl... more
  • 13 Days Ago

  • NinjaOne Austin, TX
  • About the Role People are the life of any company. As the Director of Talent Acquisition at NinjaOne, you will be the caretaker of our global recruiting en... more
  • 14 Days Ago

  • NinjaOne Connecticut, CT
  • Description About the Role As the Communications Specialist, MSP , you will be responsible for shaping how we communicate our story to Managed Service Prov... more
  • 15 Days Ago


Not the job you're looking for? Here are some other Senior Cyber Threat Intelligence Specialist jobs in the Connecticut, CT area that may be a better fit.

  • KELA - Cyber Threat Intelligence Illinois, IL
  • About us KELA is a global leader in cyber threat intelligence & continuous attack surface management, delivering unparalleled insights into the ever-evolvi... more
  • 1 Month Ago

  • Information Technology Senior Management Forum Mc Lean, VA
  • Posted Date 11/24/2025 Description Manager, Cyber Threat Intelligence Do you love building and pioneering in the technology space? Do you enjoy solving com... more
  • 5 Days Ago

AI Assistant is available now!

Feel free to start your new journey!