Cyber Threat Intelligence Analyst

Posted 9 Days Ago
Be an Early Applicant
Kraków, Małopolskie
Hybrid
Junior
Artificial Intelligence • Hardware • Information Technology • Security • Software • Cybersecurity • Big Data Analytics
We help people be their best in the moments that matter.
The Role
The Cyber Threat Intelligence Analyst will collect, analyze, and disseminate intelligence regarding potential security threats, monitor various threat feeds, develop playbooks, and provide insights to leadership about cyber threats. This role involves collaborating with security operations and assisting in incident response efforts.
Summary Generated by Built In

Company Overview

At Motorola Solutions, we're guided by a shared purpose - helping people be their best in the moments that matter - and we live up to our purpose every day by solving for safer. Because people can only be their best when they not only feel safe, but are safe. We're solving for safer by building the best possible technologies across every part of our safety and security ecosystem. That's mission-critical communications devices and networks, AI-powered video security & access control and the ability to unite voice, video and data in a single command center view. We're solving for safer by connecting public safety agencies and enterprises, enabling the collaboration that's critical to connect those in need with those who can help. The work we do here matters.

Department OverviewOur IT organization isn’t just here to support our business. We’re here to reinvent it – by changing how our customers, partners, and employees interact with our company. To do that, we’re looking for people who bring great ideas and improve our partners’ ideas. Intellectually curious advisors (not order takers) who focus on outcomes to creatively solve business problems. People who not only embrace change but who accelerate it.
Job Description

As a global dynamic technology enterprise, our company presents an attractive target for malicious actors. It faces threats from internal to opportunistic to the most persistent attackers. The Cyber Threat Intelligence (CTI) team is a crucial partner to the Enterprise Information Security (EIS) program. It supports many components—like threat hunting and incident response—in its smooth and timely operations.

The CTI Analyst role is responsible for collecting, analyzing, and disseminating finished intelligence to leadership, security operations, technology stakeholders, and executive decision-makers. The analyst will be a part of a team that primarily focuses on identifying trends, patterns, and emerging threats while providing senior leadership with cyber intelligence that furthers their critical understanding of the cyber threat landscape specific to MSI. This position offers a unique opportunity for you to draw from your knowledge and experience and impact a global enterprise's security posture and decision-making.


Basic Requirements

 

Relocation Provided – None

Education Required – Bachelor's Degree or equivalent work experience

Experience Required – 2+ years of experience with Cyber Threat Intelligence (CTI) or 2+ years experience in other Intelligence Analysis fields.

Responsibilities:

  • Monitor and analyze a variety of open-source and proprietary threat intelligence feeds.

  • Develop playbooks for use in our Threat Intelligence Platform (TIP).

  • Prepare and conduct threat briefings for executive-level audiences.

  • Develop and maintain a portfolio of threat profiles, threat activity, trends, and common attack vectors from available sources.

  • Recommend network defense actions to counter adversary activity and respond to and assist the Incident Response (IR) team.

  • Correlate collected intelligence to build upon a tracked threat activity knowledge base.

  • Develop all-source intelligence products for incident response, detection engineering, and threat hunting using analysis tools, technical and non-technical data sets, and aggregators.

  • Perform OSINT and SOCMINT investigations as requested.

Skills and attributes for success:

  • Proven ability to gather, analyze, and interpret threat intelligence data from multiple sources.

  • Ability to prioritize tasks and meet deadlines in a fast-paced environment, including non-standard work hours in response to Information Security incidents.

  • Ability to convey complex information in simple, concise explanations.

  • Self-driven, creative, and can operate independently.

Requirements:

  • Must be able to speak/read/write in English with Full Professional Proficiency. 

  • Proven ability to gather, analyze, and interpret threat intelligence data from multiple sources.

  • Experience creating actionable threat intelligence reports, threat and vulnerability assessments, and threat actor profiles.

  • Strength in identifying and extracting pertinent Indicators of Compromise (IOCs) from reporting and providing them to operational teams.

  • Understanding of threat actor Tactics, Techniques, and Procedures (TTPs).

  • Knowledge of CTI frameworks (Cyber Kill Chain, Diamond Model, MITRE ATT&CK, etc.)

  • Self-driven, creative, and can operate independently. 

  • Experience with OSINT and SOCMINT investigations.

  • Excellent written and verbal communication skills, including presenting technical information to non-technical audiences.

  • Knowledge of cybersecurity and privacy principles, cyber threats, vulnerabilities, exploits, and the Threat Intelligence Cycle.

  • Understanding of computer networking concepts, the OSI model, and underlying network protocols.

Desired:

  • Industry certifications related to CTI, Pen Testing, Forensics, Networking, or Security (such as GCTI, GCIH, GCFE, GCFA, ATT&CK CTI).2+ years of experience in programming or scripting (Python, SQL, PHP, PowerShell).

  • Language proficiency certification (such as TOEFL/ACTFL/DLPT)

  • Experience with TIPs/TIMs/EDR/SIEMs/SOAR etc.

  • Strength in uncovering relationships or trends using Maltego or other graphical link analysis tools to discover hidden relationships between IoCs.

  • Experience with threat hunting for both indicator-based hunting (known threats) and hypothesis-driven hunting (unknown threats) through log analysis.

  • Familiarity with Wireshark or other packet/protocol analysis tools.

In return for your expertise, we’ll support you in this new challenge with coaching & development every step of the way. 

Also, to reward your hard work you’ll get:

  • Competitive salary package

  • Private medical & dental coverage

  • Employee Pension Plan

  • Life insurance

  • Employee Stock Purchase Plan

  • Flexible working hours

  • Strong collaborative culture

  • Comfortable work conditions (high-class offices, parking space)

  • Volleyball field and grill place next to the office

  • Access to wellness facilities and integration events as well as training and broad

  • Development opportunities

#LI-LB1

 


Travel Requirements
Under 10%
Relocation Provided
Domestic
Position Type
Experienced

Referral Payment PlanNo

CompanyMotorola Solutions Systems Polska Sp.z.o.o

EEO Statement

Motorola Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion or belief, sex, sexual orientation, gender identity, national origin, disability, veteran status or any other legally-protected characteristic. 

We are proud of our people-first and community-focused culture, empowering every Motorolan to be their most authentic self and to do their best work to deliver on the promise of a safer world. If you’d like to join our team but feel that you don’t quite meet all of the preferred skills, we’d still love to hear why you think you’d be a great addition to our team.

We’re committed to providing an inclusive and accessible recruiting experience for candidates with disabilities, or other physical or mental health conditions. To request an accommodation, please email [email protected].

Top Skills

Cyber Threat Intelligence

What the Team is Saying

Tunde
Brian
The Company
HQ: Chicago, IL
21,000 Employees
Hybrid Workplace
Year Founded: 1928

What We Do

Motorola Solutions is solving for safer. We build and connect technologies to help protect people, property and places. Our solutions enable the collaboration between public safety agencies and enterprises that’s critical for a proactive approach to safety and security. Learn more about how we’re solving for safer communities, safer schools, safer hospitals, safer businesses – safer everywhere.

Why Work With Us

We are a global family of driven, dynamic people who inspire and support everyone around us to be the best version of themselves. We embrace a “people first” philosophy – and are committed to creating and maintaining a culture of caring and inclusiveness. Are you ready to join our team and be a part of a close-knit community in a big company?

Gallery

Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery

Motorola Solutions Offices

Hybrid Workspace

Employees engage in a combination of remote and on-site work.

We believe that the next big idea can come from anyone, anywhere, at any time. That’s why we offer office-based, hybrid and remote working models, where Motorolans can do their best work wherever they work best.

Typical time on-site: Flexible
HQChicago, IL
BC
SG
Bayan Lepas, Penang
Bengaluru, IN
Birmingham, AL
Bogotá, CO
Brentwood, TN
Buenos Aires, Buenos Aires
Cork, IE
Dallas, TX
Elgin, IL
Kraków, PL
London, GB
Plantation, FL
Queens, NY
Salt Lake City, UT
São Paulo, Sao Paulo
Schaumburg, IL
Somerville, MA
Temecula, CA
Toronto, CA
Westminster, CO
Learn more

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account