We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

IS Cyber Threat Intelligence Analyst HQ

Turner Construction Company
United States, Tennessee, Nashville
624 Grassmere Park (Show on map)
Feb 20, 2026
Division: Headquarters
Project Location(s): Saddle Brook, NJ 07663 USA
Minimum Years Experience:
Travel Involved:
Job Type: Regular
Job Classification: Experienced
Education:
Job Family: Information Services
Compensation: Salaried Exempt

Location: Position can be performed from any U.S. company office.

Position Description: The Cyber Threat Intelligence Analyst supports the
organization's cybersecurity and digital risk protection program by
independently monitoring, analyzing, and assessing external digital threats
targeting corporate identity, personnel, customers, and brand assets. This role
evaluates online threat activity, conducts structured intelligence analysis,
and assesses risk impact to the organization.

The analyst is responsible for correlating open-source
intelligence (OSINT), external threat data, and internal context to identify
patterns, assess potential business impact, and support response actions. This
position contributes to the development of intelligence reporting, threat trend
analysis, and continuous improvement of monitoring and response processes.

Essential Duties & Key Responsibilities:

  • Monitor and analyze open-source intelligence (OSINT) to identify threats targeting the organization, its personnel, or customers.
  • Conduct structured investigations into reported online abuse, impersonation campaigns, data exposure, and social engineering attempts.
  • Assess risk and impact of identified threats including reputational, operational, regulatory, and safety implications.
  • Correlate external threats in intelligence with internal telemetry and contextual business information to support escalation decisions.
  • Develop written intelligence reports summarizing findings, threat actor tactics, techniques, and procedures (TTPs), trends, and recommended mitigation actions.
  • Identify recurring patterns or emerging campaigns and provide actionable recommendations to reduce exposure.
  • Coordinate with Cyber Security Operation, Legal, Human Resources, Marketing, Physical Security, Senior Management and business teams to ensure appropriate containment, documentation, and mitigation actions are taken.
  • Contribute to refinement of playbooks and documentation standards to improve repeatability and consistency.
  • Track threat intelligence metrics, key risk indicators (KRIs) and develop executive-level threat reports as required.
  • Support vendor coordination and third-party takedown processes when malicious domains, fraudulent accounts, or impersonation sites are identified.
  • Maintain awareness of relevant regulatory considerations, including privacy and data protection requirements under U.S. federal and state laws and GDPR where applicable.
  • Participate in tabletop exercises, threat briefings, and cross-functional risk discussions related to external threat exposure.
  • Other activities, duties, and responsibilities as assigned.

Qualifications:

  • Bachelor's Degree in Cybersecurity, Information Systems, or a related technical field required; degrees in other fields such as Communications, Data Analytics, Public Relations, Criminal Justice, or Legal Studies may be considered when accompanied by relevant cybersecurity or threat intelligence experience; or equivalent combination of education and experience.
  • Minimum of 2-5 years of experience in threat intelligence, fraud analysis, digital risk protection, or related cybersecurity roles.
  • Experience conducting independent investigations and producing structured analytical reports.
  • Understanding of OSINT methodologies, threat actor behaviors, impersonation tactics, and social engineering techniques.
  • Familiarity with threat intelligence frameworks such as MITRE ATT&CK and the cyber kill chain.
  • Knowledge of regulatory considerations related to data exposure, privacy, and digital communications (e.g., HIPAA, FERPA, CCPA, GDPR).
  • Strong analytical, investigative, and documentation skills with ability to translate technical findings into business risk language.
  • Ability to work independently, prioritize multiple investigations, and make risk-based decisions.
  • Professional certifications such as Security+, CySA+, CTI-related certifications, or similar preferred.
  • Familiarity with dark web forums, marketplaces, and anonymized networks (e.g., TOR) desired.
  • High level of integrity, discretion, and professional judgment when handling sensitive or confidential information.
  • Limited travel may be required.

The annual salary range for candidates located in the Anaheim and Denver areas is $110,000 to $145,000.


Turner is an Equal Opportunity Employer - race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or other characteristics protected by applicable law.

Applied = 0

(web-54bd5f4dd9-dz8tw)