We are hiring a highly analytical Threat Intelligence Analyst to help LockedIn AI stay ahead of evolving cyber threats targeting our platform, AI systems, customers, and internal operations.
This role is ideal for someone who understands modern adversaries, threat actors, AI-related attack vectors, and cyber intelligence workflows. You will gather intelligence, assess risk, track emerging threats, and turn complex threat data into actionable security decisions.
You’ll work closely with leadership, engineering, product, and security teams to protect a platform trusted by millions.
Responsabilidades
- Threat Intelligence & Monitoring Continuously monitor cyber threats, dark web activity, OSINT sources, threat feeds, and social channels Identify risks targeting AI platforms, SaaS environments, and user-facing products Track phishing campaigns, credential leaks, impersonation threats, and data exposure risks Analyze threat actor tactics, techniques, and procedures (TTPs) AI Security Intelligence Research prompt injection, jailbreak methods, model extraction, adversarial inputs, and data poisoning attacks Monitor AI threat frameworks such as MITRE ATLAS and OWASP LLM Top 10 Partner with engineering teams to improve guardrails and AI defenses Track AI-generated phishing, deepfakes, and automated cyber attacks Detection & Incident Support Build threat-informed SIEM rules, alerts, and detection logic Support investigations during security incidents with threat context Produce post-incident reports and intelligence findings Help automate enrichment of security alerts Strategic Reporting Deliver executive briefings, daily threat summaries, tactical alerts, and risk assessments Maintain internal intelligence databases and actor profiles Recommend security investments based on real-world threat trends
Requisitos de experiencia
- 3+ years in threat intelligence, cyber security analysis, or related field
Requisitos de Educación
- Required Experience 3+ years in threat intelligence, cyber security analysis, or related field Experience producing intelligence reports for both technical and executive audiences Strong OSINT research and threat actor tracking skills Experience working cross-functionally with engineers and leadership Startup mindset with ability to move quickly and own outcomes Technical Skills Deep understanding of cyber threats, attack vectors, and adversary behavior Experience with SIEM tools such as Splunk, Sentinel, Elastic, or similar Familiarity with MITRE ATT&CK, MITRE ATLAS, and OWASP frameworks Networking knowledge: DNS, HTTP, SMTP, SSH, TCP/IP Python or scripting experience for automation is a plus Preferred AI security or LLM threat intelligence experience Dark web monitoring or attribution background SaaS / consumer platform security experience Security certifications such as CTIA, GCTI, CISSP, CEH, Security+
For more information, contact LockedIn at [email protected].