Pay is based on several factors which vary based on position. These include labor markets and in some instances may include education, work experience and certifications. In addition to your pay, Target cares about and invests in you as a team member, so that you can take care of yourself and your family. Target offers eligible team members and their dependents comprehensive health benefits and programs, which may include medical, vision, dental, life insurance and more, to help you and your family take care of your whole selves. Other benefits for eligible team members include 401(k), employee discount, short term disability, long term disability, paid sick leave, paid national holidays, and paid vacation. Find competitive benefits from financial and education to well-being and beyond at https://corporate.target.com/careers/benefits.
JOIN TARGET AS A SR CYBER THREAT INTELLIGENCE ANALYST
ABOUT US:
Working at Target means helping all families discover the joy of everyday life. We bring that vision to life through our values and culture. Learn more about Target here.
As a Sr Cyber Threat Intelligence Analyst on Target’s Cyber Threat Intelligence (CTI) team, you will support the identification, collection, analysis, production, and dissemination of intelligence on cyber threat activity that may pose a risk to Target. This role contributes to strategic, operational, and tactical intelligence objectives by converting threat reporting, technical indicators, behavioral observations, and internal security context into insights that inform detection, response, and risk prioritization.
You will work closely with fellow CTI analysts and cross-functional security partners to understand and communicate cyber threat activity relevant to Target. A successful candidate will demonstrate analytic rigor, technical curiosity, sound judgment, and the ability to operate independently while collaborating across teams to strengthen analytic tradecraft and advance CTI capabilities.
Use your skills, experience, and talents to be a part of groundbreaking thinking and visionary goals. As a Sr Cyber Threat Intelligence Analyst, you will:
- Serve as an all-source cyber threat intelligence analyst supporting operational and tactical CTI priorities through the collection, evaluation, cataloging, and analysis of threat information from internal telemetry, external reporting, open-source research, vendor sources, peer communities, and security investigations.
- Analyze indicators of compromise, threat actor TTPs, intrusion patterns, malware behaviors, infrastructure, vulnerabilities, and campaign activity to generate actionable intelligence for Target.
- Develop and maintain subject-matter expertise on cybercriminal groups, emerging threats, technology platforms, and threat vectors relevant to Target’s operating environment.
- Partner with CSIRT, Reverse Engineering, Threat Management, Vulnerability Management, and other security teams to contextualize threats, support investigations, and refine detection and response efforts.
- Draft, edit, and deliver finished intelligence products and briefings, including threat assessments, actor profiles, incident support reporting, and recurring intelligence updates.
- Apply structured analytic techniques and frameworks such as the intelligence cycle, Diamond Model, Cyber Kill Chain, MITRE ATT&CK, and threat hunting methodologies to identify patterns, support judgments, and communicate analytic confidence.
- Identify opportunities to improve CTI processes, tools, collection requirements, analytic workflows, and dissemination methods; partner with Threat Intelligence Engineering and cross-functional teams to automate and streamline workflows.
- Coordinate with trusted external peer groups, industry communities, and information-sharing partners to exchange intelligence, maintain awareness of the broader cyber threat landscape, and influence outcomes that advance CTI priorities.
Core responsibilities of this job are described within this job description. Job duties may change at any time due to business needs.
ABOUT YOU:
- 4-year degree in Cyber Security, Intelligence Studies, Security Studies, International Relations, Political Science, Computer Science or equivalent industry experience
- 3+ years of experience in information security, preferably in cyber threat intelligence, security operations, incident response, threat hunting, malware analysis, or another investigative cyber role, with understanding of malware analysis fundamentals, indicator development, infrastructure analysis, and detection or response support
- Experience tracking cybercriminal, nation-state, high-grade, or other cyber threat actors using internal and external data sources, with knowledge of current threat techniques, vulnerability disclosures, data breach incidents, malware trends, social engineering methods, and security analysis techniques
- Extensive experience producing intelligence products and briefings for incident response, detection engineering, security operations, leadership, or business stakeholders, with strong verbal, written, and presentation skills and the ability to translate complex technical concepts into clear and business-relevant language
- Demonstrated ability to collect, analyze, synthesize, and interpret qualitative and quantitative data from multiple sources; develop threat expertise; identify complex actor behavior patterns; and produce actionable judgments with appropriate analytic confidence
- Experience applying analytic frameworks and methodologies such as the intelligence cycle, Diamond Model, Cyber Kill Chain, MITRE ATT&CK, and structured analytic techniques
- Experience using digital investigation and intelligence tools such as VirusTotal, VMRay, DomainTools, URLScan, Maltego, Analyst Notebook, or comparable platforms along with strong online research skills across technical, open-source, social media, forum, and traditional sources
- Exceptional problem-solving skills, intellectual curiosity, attention to detail, and ability to operate effectively in a fast-paced environment that includes supporting time-sensitive security investigations
- Excellent communication skills with the ability to speak to both business and technical teams as well as translate ideas between them
- Self-driven and results oriented; able to meet tight timelines
- Motivated, team player with ability to collaborate effectively across global team
Benefits Eligibility
Please paste this url into your preferred browser to learn about benefits eligibility for this role: https://tgt.biz/BenefitsForYou_DAmericans with Disabilities Act (ADA)
In compliance with state and federal laws, Target will make reasonable accommodations for applicants with disabilities. If a reasonable accommodation is needed to participate in the job application or interview process, please reach out to [email protected]. Non-accommodation-related requests, such as application follow-ups or technical issues, will not be addressed through this channel.
Application deadline is : 06/11/2026Similar Jobs
What you need to know about the Colorado Tech Scene
Key Facts About Colorado Tech
- Number of Tech Workers: 260,000; 8.5% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Lockheed Martin, Century Link, Comcast, BAE Systems, Level 3
- Key Industries: Software, artificial intelligence, aerospace, e-commerce, fintech, healthtech
- Funding Landscape: $4.9 billion in VC funding in 2024 (Pitchbook)
- Notable Investors: Access Venture Partners, Ridgeline Ventures, Techstars, Blackhorn Ventures
- Research Centers and Universities: Colorado School of Mines, University of Colorado Boulder, University of Denver, Colorado State University, Mesa Laboratory, Space Science Institute, National Center for Atmospheric Research, National Renewable Energy Laboratory, Gottlieb Institute

.png)

