Threat Intelligence Analyst

Optomi
Charlotte, NC

Threat Intelligence Analyst - Hybrid in Charlotte, NC or Manhattan, NY


Optomi, in partnership with a leading enterprise client, is looking to add a Threat Intelligence Analyst to their team! This is a build-focused role, not a passive monitoring position. The selected candidate will be responsible for establishing and maturing a threat intelligence program in early stages, with a strong emphasis on the healthcare threat landscape.

You will play a critical role in shifting the organization from a reactive security posture to a proactive, intelligence-driven defense strategy.


What You’ll Be Doing

  • Build and operationalize a threat intelligence program tailored to healthcare-related threats (ransomware, PHI targeting, etc.)
  • Monitor and analyze adversary behavior, including TTPs and attack patterns
  • Perform threat hunting and proactive investigations
  • Aggregate and automate intelligence from multiple sources (OSINT, internal telemetry, threat feeds)
  • Conduct malware analysis to understand behavior and impact
  • Identify vulnerabilities and provide actionable mitigation strategies
  • Translate technical findings into clear, executive-level reporting
  • Develop security standards, processes, and best practices around threat intelligence
  • Drive adoption of threat intelligence into detection and response workflows


What They’re Looking For

  • Hands-on experience with threat hunting, incident analysis, or detection engineering
  • Ability to translate intelligence into real-world security outcomes
  • Strong communication skills with the ability to present to leadership
  • Experience building or maturing a threat intelligence capability preferred (not just consuming intel)
  • Strong understanding of adversary behavior and threat frameworks (e.g., MITRE ATT&CK)


Required Experience

  • 2-5+ years in Threat Intelligence, Incident Response, Threat Hunting, or similar
  • Experience analyzing threats, attack patterns, and adversary techniques
  • Familiarity with SIEM or security analytics tools (Splunk, Sentinel, Sumo Logic, etc.)
  • Experience creating reports and presenting findings to stakeholders
// // //