{"id":1757,"date":"2025-01-21T20:42:14","date_gmt":"2025-01-21T20:42:14","guid":{"rendered":"https:\/\/chin4teck.com\/?page_id=1757"},"modified":"2025-01-21T20:42:14","modified_gmt":"2025-01-21T20:42:14","slug":"what-in-the-world-is-a-cyber-threat-intelligence-analyst","status":"publish","type":"page","link":"https:\/\/chin4teck.com\/index.php\/what-in-the-world-is-a-cyber-threat-intelligence-analyst\/","title":{"rendered":"What in the world is a Cyber Threat Intelligence Analyst?"},"content":{"rendered":"\n<p class=\"has-text-align-center\">For a project, I watch the presentation by Katie Nickels on The Cycle of Cyber Threat Intelligence, by SANS Digital Forensics and Incident Response, and decided to do a review. The presentation was really good, I was already familiar with a lot of the terms and topics but was somehow better able to make a connection to those that intertwine through a deeper in-depth analysis of the intelligence life cycle.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-dveyGp\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-mgZXdb animated guten-element-hide slower desktop-flash\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2023\/04\/cyber-incident-istockphoto-479801072-612x612-1.jpg\" height=\"408\" width=\"612\"\/><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">A cyber threat intelligence analyst is responsible for proactively discovering, assessing, and mitigating potential cyber risks to an organization&#8217;s assets, networks, and systems. This position entails acquiring intelligence from a variety of sources, assessing trends, and offering actionable insights to improve the organization&#8217;s cybersecurity posture. This is done by constantly \u201canalyzing information about the hostile intent, capability and opportunities of an adversary that satisfies a requirement.\u201d In order to be a successful CTI analyst, you will need to be proficient in understanding the Intelligence Life Cycle, which involves 5 key foundations or phases: Planning and Direction, Collection, Processing and Exploitation, Analysis and production, and finally Dissemination, to further continue the Intelligence cycle all over again, to create and plan out intelligence. We&nbsp; can define intelligence as&nbsp; the collection and processing of information about a competitive entity and its agents, needed by an organization or group for its security wellbeing.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-hYBYce\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">&nbsp;The role of a Cyber Threat Intelligence Analyst is critical in strengthening an organization&#8217;s resilience to cyber threats. By staying on top of emerging threats and vulnerabilities, these specialists enable firms to install defensive measures ahead of time, reducing the risk of data breaches, financial losses, and reputational harm. A Cyber Threat Intelligence team can be an invaluable asset to an organization; however, it is more effective and efficient if placed in a centralized location. Here it can easily support more than just one team, whether it may be the Security Operations Center(SOC), or Incidence Response, system engineering and IT, business operations, or even vulnerability management, thus providing intelligence on which ever specific division or unit that requires it.<\/p>\n\n\n\n<p class=\"has-text-align-center\">This specific role relies heavily on intelligence sharing resources that that can stem from a utilizing threat intelligence database with TTP\u2019s, IOC\u2019s and signatures, to contributing to said database with analysis and findings of a new discovery(malware, IOC\u2019s, TTP\u2019s etc.). There are several different techniques used to share or gather intelligence. These include and are not limited to:<\/p>\n\n\n\n<p class=\"has-text-align-center\">Information Sharing and Analysis Centers (ISACs): Financial Services ISAC (FS-ISAC) and Healthcare ISAC (H-ISAC) facilitate cyber threat intelligence sharing within their respective sectors, fostering collaboration among industry peers to enhance cybersecurity resilience.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-uoNmZg\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-mtdxMi animated guten-element-hide desktop-zoomInUp\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/isacs.png\" height=\"630\" width=\"1200\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-VRYkHd\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">Open-Source Intelligence (OSINT) Platforms: Twitter and Reddit serve as valuable sources for monitoring cyber threats and activities of threat actors. Security professionals leverage these platforms to gather insights, share findings, and stay informed about emerging threats.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-rzn5Qo\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-EAciAb animated guten-element-hide slower desktop-zoomInUp\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/logo-osint.png\" height=\"475\" width=\"969\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-geqsvf\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">Government Agencies: Department of Homeland Security (DHS) and National Security Agency (NSA) provide cyber threat intelligence and guidance to both public and private sector entities. They collaborate with organizations to enhance cybersecurity posture and mitigate threats, including the Cybersecurity and Infrastructure Security Agency (CISA). MITRE att&amp;ck framework\/ database, NVD and CVE.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-image-marque guten-element guten-image-marque horizontal guten-6e5Y6W animated guten-element-hide slower desktop-bounce reverse\"><div class=\"marque-wrapper marque-animate-guten-6e5Y6W\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/61017d1f8c4c0160eb630d51_logo-CVE.png\"\/><\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/nvd.png\"\/><\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Screenshot-2025-01-21-151745.png\"\/><\/div><\/div><\/div><div class=\"marque-wrapper marque-animate-guten-6e5Y6W\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/61017d1f8c4c0160eb630d51_logo-CVE.png\"\/><\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/nvd.png\"\/><\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Screenshot-2025-01-21-151745.png\"\/><\/div><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">Commercial Threat Intelligence Providers: FireEye Mandiant and Recorded Future offer subscription-based services for curated threat intelligence feeds tailored to organizations&#8217; industry and risk profile. These providers deliver actionable insights and recommendations to help organizations proactively identify and mitigate cyber threats. (Virus Total)<\/p>\n\n\n\n<p class=\"has-text-align-center\">There exist a wide variety of tools that can be employed and incorporated by a CTI analyst, yet a significant if not all trace back to one or more phase or function of the threat intelligence life cycle:<\/p>\n\n\n\n<p class=\"has-text-align-center\">Planning and direction: This phase involves evaluating the intelligence requirements( what is needed, whether it falls under strategic, operational, or tactical intelligence), threat modelling(knowing what you have in your organization that someone else may want, attack surfaces ), and even collection management( gathering of information and intelligence, collection you now have and what you may use it for). Security Information and Event Management (SIEM) Systems such as Splunk Enterprise Security, IBM QRadar, and LogRhythm are centralized platforms which serve to aggregate, correlate, and analyze security event data from an organization&#8217;s infrastructure.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Collection: At this phase, CTI analysts focus on gathering intelligence from various sources, including intrusion analysis(Lockheed Martin kill chain to observe TTP\u2019s, threat identity), malware analysis(virus total), domains(data pivoting), external and internal datasets, and even TLS certificates(Censys.io, Scans.io, Circl.lu). SIEM systems cover internal threats, while Cyber Threat Intelligence Feeds like Intel471, Recorded Future, and Cisco Talos provide real-time updates on emerging threats, indicators of compromise (IOCs), malicious IP addresses and malicious infrastructure.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Processing and Exploitation: At this phase, there\u2019s a need for structured models(turn data into buckets, allowing for extraction of data and identification of patterns). Analysis tools include the cyber\/Lockheed Martin kill chain, Diamond model, MITRE ATT&amp;CK model, veris, which helps to organize the data in preparation for analysis. Collected intel can be stored\u00a0 in Threat Intelligence Platforms(TIP\u2019s), like CRITS, MISP, THREAT_NOTE or YETI. ThreatConnect, Anomali ThreatStream, and Recorded Future are TIPs that facilitate the aggregation, enrichment, and dissemination of threat intelligence.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Analysis and Production: During this phase analysts must be aware of biases that may affect their analysis. Vulnerability scanners(Qualys Vulnerability Management, Tenable Nessus, Nmap and Rapid7 InsightVM for internal threats), Wireshark( for packet analysis), Cuckoo Sandbox, Virus Total, and FireEye Malware Analysis are tools used for analyzing and understanding the behavior of malicious software samples.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-JyOMB8\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image-marque guten-element guten-image-marque horizontal guten-W1EiQZ animated guten-element-hide slower desktop-rollIn\"><div class=\"marque-wrapper marque-animate-guten-W1EiQZ\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/intel-471-logo.png\"\/><\/div><div class=\"marque-item-description\">Intel 471<\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Mandiant-Logo.wine_.png\"\/><\/div><div class=\"marque-item-description\">Mandiant<\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/IBM-QRadar-Partner-InfoGuard.png\"\/><\/div><div class=\"marque-item-description\">IBM QRadar<\/div><\/div><div class=\"marque-item marque-index-3\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/FireEye_logo_logotipo.png\"\/><\/div><div class=\"marque-item-description\">FireEye<\/div><\/div><div class=\"marque-item marque-index-4\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/anomali.jpg\"\/><\/div><div class=\"marque-item-description\">Anomali<\/div><\/div><div class=\"marque-item marque-index-5\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Cisco-Talos.png\"\/><\/div><div class=\"marque-item-description\">Cisco Talos<\/div><\/div><div class=\"marque-item marque-index-6\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/MISP-Malware-Information-Sharing-Platform.jpg\"\/><\/div><div class=\"marque-item-description\">MISP<\/div><\/div><div class=\"marque-item marque-index-7\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/recorded-future-inc-vector-logo-2022.png\"\/><\/div><div class=\"marque-item-description\">Recorded Future<\/div><\/div><div class=\"marque-item marque-index-8\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Yeti-Emblem.png\"\/><\/div><div class=\"marque-item-description\">Yeti<\/div><\/div><div class=\"marque-item marque-index-9\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/threatconnect-opengraph.png\"\/><\/div><div class=\"marque-item-description\">Threat Connect<\/div><\/div><div class=\"marque-item marque-index-10\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/343-3438480_splunk-enterprise-security-logo-hd-png-download.png\"\/><\/div><div class=\"marque-item-description\">Splunk Enterprise<\/div><\/div><div class=\"marque-item marque-index-11\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/867dbd94705151.Y3JvcCw3NzksNjA5LDMzMCw3.png\"\/><\/div><div class=\"marque-item-description\">Threat Note<\/div><\/div><\/div><div class=\"marque-wrapper marque-animate-guten-W1EiQZ\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/intel-471-logo.png\"\/><\/div><div class=\"marque-item-description\">Intel 471<\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Mandiant-Logo.wine_.png\"\/><\/div><div class=\"marque-item-description\">Mandiant<\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/IBM-QRadar-Partner-InfoGuard.png\"\/><\/div><div class=\"marque-item-description\">IBM QRadar<\/div><\/div><div class=\"marque-item marque-index-3\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/FireEye_logo_logotipo.png\"\/><\/div><div class=\"marque-item-description\">FireEye<\/div><\/div><div class=\"marque-item marque-index-4\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/anomali.jpg\"\/><\/div><div class=\"marque-item-description\">Anomali<\/div><\/div><div class=\"marque-item marque-index-5\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Cisco-Talos.png\"\/><\/div><div class=\"marque-item-description\">Cisco Talos<\/div><\/div><div class=\"marque-item marque-index-6\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/MISP-Malware-Information-Sharing-Platform.jpg\"\/><\/div><div class=\"marque-item-description\">MISP<\/div><\/div><div class=\"marque-item marque-index-7\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/recorded-future-inc-vector-logo-2022.png\"\/><\/div><div class=\"marque-item-description\">Recorded Future<\/div><\/div><div class=\"marque-item marque-index-8\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Yeti-Emblem.png\"\/><\/div><div class=\"marque-item-description\">Yeti<\/div><\/div><div class=\"marque-item marque-index-9\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/threatconnect-opengraph.png\"\/><\/div><div class=\"marque-item-description\">Threat Connect<\/div><\/div><div class=\"marque-item marque-index-10\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/343-3438480_splunk-enterprise-security-logo-hd-png-download.png\"\/><\/div><div class=\"marque-item-description\">Splunk Enterprise<\/div><\/div><div class=\"marque-item marque-index-11\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/867dbd94705151.Y3JvcCw3NzksNjA5LDMzMCw3.png\"\/><\/div><div class=\"marque-item-description\">Threat Note<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-xO9zBr\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-0GEmbD\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">Dissemination: here you can implement effective report writing, so you can give different assessments of different confidence levels.<\/p>\n\n\n\n<p class=\"has-text-align-center\">In conclusion, Cyber Threat Intelligence Analysts require technical expertise, analytical acumen, and strong communication skills. Through utilizing intelligence sharing resources and a range of tools, they play a crucial role in safeguarding organizations from evolving threats, ensuring business continuity, and protecting valuable assets.<\/p>\n\n\n\n<p class=\"has-text-align-center\">The Cycle of Cyber Threat Intelligence : <a href=\"https:\/\/www.youtube.com\/watch?v=J7e74QLVxCk\">https:\/\/www.youtube.com\/watch?v=J7e74QLVxCk<\/a><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-R2VYtd\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>For a project, I watch the presentation by Katie Nickels on The Cycle of Cyber Threat Intelligence, by SANS Digital Forensics and Incident Response, and decided to do a review. The presentation was really good, I was already familiar with a lot of the terms and topics but was somehow better able to make a connection to those that intertwine through a deeper in-depth analysis of the intelligence life cycle. A cyber threat intelligence analyst is responsible for proactively discovering, assessing, and mitigating potential cyber risks to an organization&#8217;s assets, networks, and systems. This position entails acquiring intelligence from a<\/p>\n","protected":false},"author":1,"featured_media":1259,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-1757","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/pages\/1757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/comments?post=1757"}],"version-history":[{"count":5,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/pages\/1757\/revisions"}],"predecessor-version":[{"id":1788,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/pages\/1757\/revisions\/1788"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/media\/1259"}],"wp:attachment":[{"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/media?parent=1757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}