What are the responsibilities and job description for the Threat Intelligence Analyst position at Optomi?
Threat Intelligence Analyst - Hybrid in Charlotte, NC or Manhattan, NY
Optomi, in partnership with a leading enterprise client, is looking to add a Threat Intelligence Analyst to their team! This is a build-focused role, not a passive monitoring position. The selected candidate will be responsible for establishing and maturing a threat intelligence program in early stages, with a strong emphasis on the healthcare threat landscape.
You will play a critical role in shifting the organization from a reactive security posture to a proactive, intelligence-driven defense strategy.
What You’ll Be Doing
- Build and operationalize a threat intelligence program tailored to healthcare-related threats (ransomware, PHI targeting, etc.)
- Monitor and analyze adversary behavior, including TTPs and attack patterns
- Perform threat hunting and proactive investigations
- Aggregate and automate intelligence from multiple sources (OSINT, internal telemetry, threat feeds)
- Conduct malware analysis to understand behavior and impact
- Identify vulnerabilities and provide actionable mitigation strategies
- Translate technical findings into clear, executive-level reporting
- Develop security standards, processes, and best practices around threat intelligence
- Drive adoption of threat intelligence into detection and response workflows
What They’re Looking For
- Experience building or maturing a threat intelligence capability (not just consuming intel)
- Strong understanding of adversary behavior and threat frameworks (e.g., MITRE ATT&CK)
- Hands-on experience with threat hunting, incident analysis, or detection engineering
- Ability to translate intelligence into real-world security outcomes
- Strong communication skills with the ability to present to leadership
Required Experience
- 3–7 years in Threat Intelligence, Incident Response, Threat Hunting, or similar
- Experience analyzing threats, attack patterns, and adversary techniques
- Familiarity with SIEM or security analytics tools (Splunk, Sentinel, Sumo Logic, etc.)
- Experience creating reports and presenting findings to stakeholders
Salary : $80,000 - $100,000