Be an Early Applicant
Plurilock Overview
The Role
The role involves analyzing threat intelligence, tracking threat actors, producing intelligence reports, and integrating CTI feeds into security operations workflows.
Summary Generated by Built In
Mid-Level Cyber Threat Intelligence (CTI) Analyst
Job Description (5–8 bullets):
- Collect, analyze, and enrich threat intelligence from internal and external sources
- Track threat actors, campaigns, TTPs, and emerging risks
- Produce actionable intelligence reports for SOC and security leadership
- Map threats using MITRE ATT&CK and support detection use cases
- Integrate CTI feeds into SIEM, SOAR, and SOC workflows
- Support proactive threat hunting activities
- 5+ years of experience in cybersecurity with focus on threat intelligence or threat research
- Willing to work onsite in Noida, Hyderabad, or Bangalore
Top Skills
Mitre Att&Ck
SIEM
Soar
Am I A Good Fit?
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.
Success! Refresh the page to see how your skills align with this role.
The Company
What We Do
Plurilock sells cybersecurity solutions to the United States and Canadian Federal Governments and to Global 2000 companies. Through these relationships, Plurilock sells its Plurilock AI platform and its unique brand of critical services—leveraging our expertise to aid clients in defending against, detecting, and preventing costly data breaches and cyberattacks.








