InvoiceCloud Logo

InvoiceCloud

Cyber Threat Analyst

Posted Yesterday
Be an Early Applicant
Remote
Hiring Remotely in US
Mid level
Remote
Hiring Remotely in US
Mid level
The Cyber Threat Analyst identifies and analyzes cyber threats, enhancing security measures through threat intelligence, detection engineering, and collaboration with technical teams.
The summary above was generated by AI

About InvoiceCloud

InvoiceCloud is a fast-growing fintech leader recognized with 20 major awards in 2025, including USA TODAY and Boston Globe Top Workplaces, multiple SaaS Awards wins for Best Solution for Finance and FinTech, and national customer service honors from Stevie and the Business Intelligence Group. Judges also highlighted our mission to reduce digital exclusion and restore simplicity and dignity to how people pay for essential services, as well as our leadership in AI maturity and responsible innovation. It’s an award-winning, purpose-driven environment where top talent thrives. To learn more, visit InvoiceCloud.com. 

Job Details:

We are seeking a highly analytical and proactive Cyber Threat Analyst to support the Cybersecurity organization. This role plays a critical part in strengthening InvoiceCloud’s proactive defense posture by identifying, analyzing, and operationalizing emerging cyber threats across the enterprise.

As a subject matter expert in threat intelligence, threat hunting, and detection engineering, this individual integrates intelligence into actionable detection and response improvements. The Cyber Threat Analyst partners closely with SOC, DevSecOps, Architecture, and Engineering teams to ensure threat-informed design, improved alert fidelity, and measurable enhancements to security controls.

This is a highly specialized role requiring strong analytical depth, structured problem-solving, and the ability to translate complex attacker behaviors into clear defensive strategies. Success in this role means consistently turning intelligence insights into operational outcomes—improving visibility, reducing false positives, strengthening detections, and communicating risk clearly to both technical teams and executive stakeholders.

The ideal candidate combines deep knowledge of MITRE ATT&CK, behavioral detection methodologies, and modern telemetry analysis with the ability to build repeatable workflows, support system design with threat modeling, and influence cross-functional partners without direct authority.

Success Profile:

This role is anchored in our company’s core competencies. These competencies reflect the mindsets and behaviors that define success in this role. We outline how each competency translates into real-world actions and outcomes specific to this role.

Results Driven

  • Leads Threat Intelligence Collection & Analysis by collecting, evaluating, and synthesizing intelligence from internal telemetry, OSINT, vendor feeds, advisories, and community reporting, producing actionable outputs that measurably strengthen defensive posture.
  • Executes proactive Threat Hunting & Behavioral Detection initiatives using endpoint, network, identity, and cloud telemetry, developing hypotheses aligned to MITRE ATT&CK and validating findings through evidence-based analysis that results in improved detections and controls.
  • Drives measurable improvements in Detection Engineering & SIEM Correlation by tuning existing rules, reducing false positives, recommending new detections based on attacker tradecraft, and increasing alert fidelity across the environment.
  • Delivers documented 30-, 150-, and 210-day outcomes including detection coverage improvements, closed visibility gaps, reduced triage friction, and executive-ready reporting demonstrating quantifiable risk reduction. 

Takes Ownership

  • Formalizes and operationalizes Threat Modeling & Secure Design Support during system and application design phases by identifying abuse cases, mapping likely attacker paths, and providing clear mitigation guidance to Engineering and Architecture teams.
  • Builds and maintains a structured intelligence-to-detection workflow (intake → analysis → ATT&CK mapping → detection/enrichment → validation → measurement), ensuring accountability and transparency from insight to operational impact.
  • Partners closely in Cross-Functional Collaboration with SOC, DevSecOps, and Architecture teams to embed threat intelligence into playbooks, response readiness, and control improvements while supporting incident response with attribution hypotheses and tradecraft insights.
  • Develops and publishes forward-looking 6- and 12-month threat-intelligence and threat-hunting maturation plans aligned to business priorities, clearly communicating coverage gaps, emerging risks, and strategic improvements to Security leadership and the CISO 

Drives Efficiency

  • Enhances Detection Engineering & SIEM Correlation processes by introducing structured ATT&CK mapping, telemetry validation, enrichment workflows, and standardized reporting templates that reduce friction and improve repeatability.
  • Establishes repeatable Threat Hunting & Behavioral Detection cadences, aligning hunts to prioritized attack surfaces, industry threat trends, and known adversary techniques to ensure consistent coverage over time.
  • Standardizes Reporting & Communication outputs including recurring threat briefings, campaign summaries, and risk trend analyses that translate technical findings into prioritized, defensible recommendations for both technical and non-technical stakeholders.
  • Brings order to threat-intelligence workflows by refining taxonomy standards, confidence scoring, relevance ranking, telemetry validation practices, and feedback loops across stakeholders. 

Innovative

  • Advances Threat Hunting & Behavioral Detection capabilities through hypothesis-driven analysis and multi-dimensional thinking that uncovers stealthy or sophisticated attacker activity beyond signature-based detections.
  • Leverages automation and scripting (e.g., Python or PowerShell) to enrich indicators, normalize data, generate reports, streamline intelligence triage, and improve the speed and scalability of intelligence-to-detection workflows.
  • Continuously evaluates emerging threat actor campaigns, tooling, and industry trends, translating intelligence insights into adaptive defensive strategies that strengthen InvoiceCloud’s proactive defense posture. 

Requirements

  • Bachelor’s degree in Information Security, Cybersecurity, or a related field (or equivalent experience).
  • 3–5 years of experience in threat intelligence, SOC analysis, threat hunting, detection engineering, or related cybersecurity roles.
  • Strong understanding of the MITRE ATT&CK framework and modern attacker tactics, techniques, and procedures (TTPs).
  • Experience working with SIEM, EDR, cloud, and identity telemetry to investigate threats and improve detections.
  • Ability to conduct hypothesis-driven threat hunts and translate findings into actionable detection or control improvements.
  • Experience analyzing and operationalizing threat intelligence from both internal and external sources.
  • Scripting or automation experience (e.g., Python, PowerShell) preferred.
  • Strong analytical and problem-solving skills with the ability to communicate technical findings clearly to diverse audiences.
  • Relevant certifications such as CISM, CISA, GCTI, CTIA, CEH, or similar credentials are a plus.
  • Ability to thrive in a fast-paced, collaborative environment and handle sensitive information with professionalism and discretion.

InvoiceCloud is committed to providing equal employment opportunities to all employees and applicants. We do not tolerate discrimination or harassment of any kind based on race, color, religion, age, sex, nationality, disability, genetic information, veteran or military status, sexual orientation, gender identity or expression, or any other characteristic protected under applicable laws.

This commitment applies to all aspects of employment, including recruitment, hiring, placement, promotion, termination, layoff, recall, transfer, leave, compensation, and training.

If you require a disability-related or religious accommodation during the application or recruitment process, and wish to discuss possible adjustments, please contact [email protected].

Click here to review InvoiceCloud’s Job Applicant Privacy Policy.

For recruitment agencies: InvoiceCloud does not accept unsolicited resumes from agencies. Please do not forward resumes to our job aliases, employees, or any other company location. InvoiceCloud is not responsible for any fees associated with unsolicited submissions.

Top Skills

Edr
Mitre Att&Ck
Powershell
Python
SIEM

Similar Jobs

3 Days Ago
Remote
United States
129K-178K Annually
Senior level
129K-178K Annually
Senior level
Healthtech
The Lead Cyber Threat Intelligence Analyst enhances the cyber threat intelligence lifecycle, ensuring timely, relevant intelligence for operational threat management while engaging stakeholders and continuous improvement of intelligence practices.
Top Skills: Analyst'S NotebookAtt&CkCyber Kill ChainDiamond ModelMaltego
6 Hours Ago
Remote or Hybrid
New York, NY, USA
Senior level
Senior level
Artificial Intelligence • Cloud • HR Tech • Information Technology • Productivity • Software • Automation
The role involves supporting product sales as a technical expert, leading customer workshops, providing product demonstrations, and collaborating with sales and product teams. The consultant will also engage in competitive analysis and support marketing events to enhance client engagement and satisfaction.
Top Skills: AICloud Software SolutionsServicenow
8 Hours Ago
Remote or Hybrid
United States
80K-160K Annually
Junior
80K-160K Annually
Junior
Insurance • Logistics • Software • Transportation • Business Intelligence
The Account Executive will engage prospects to qualify them for sales, manage accounts, and achieve sales targets while utilizing Salesforce for tracking.
Top Skills: Salesforce

What you need to know about the Colorado Tech Scene

With a business-friendly climate and research universities like CU Boulder and Colorado State, Colorado has made a name for itself as a startup ecosystem. The state boasts a skilled workforce and high quality of life thanks to its affordable housing, vibrant cultural scene and unparalleled opportunities for outdoor recreation. Colorado is also home to the National Renewable Energy Laboratory, helping cement its status as a hub for renewable energy innovation.

Key Facts About Colorado Tech

  • Number of Tech Workers: 260,000; 8.5% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Lockheed Martin, Century Link, Comcast, BAE Systems, Level 3
  • Key Industries: Software, artificial intelligence, aerospace, e-commerce, fintech, healthtech
  • Funding Landscape: $4.9 billion in VC funding in 2024 (Pitchbook)
  • Notable Investors: Access Venture Partners, Ridgeline Ventures, Techstars, Blackhorn Ventures
  • Research Centers and Universities: Colorado School of Mines, University of Colorado Boulder, University of Denver, Colorado State University, Mesa Laboratory, Space Science Institute, National Center for Atmospheric Research, National Renewable Energy Laboratory, Gottlieb Institute

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account