Threat intelligence analysts research adversaries - their motivations, capabilities, and tactics - to help organizations anticipate and prepare for attacks. This role sits at the intersection of research, analysis, and strategic communication.
The best threat intel analysts connect dots that others miss, turning raw data into actionable intelligence. They tailor their output to the audience - technical IOCs for SOC teams, strategic assessments for executives - and constantly question their own assumptions.
You're learning to collect and process threat data from open sources, map adversary behavior to frameworks like MITRE ATT&CK, and write clear intelligence reports that help defenders take action.
Understanding how adversaries gain entry - phishing campaigns, supply chain compromise - is the foundation of threat reporting
Phishing (T1566), Supply Chain Compromise (T1195)
Tracking how threat actors gather targeting information helps predict who they'll hit next
Gather Victim Identity Information (T1589), Search Open Websites/Domains (T1593)
Foundational security concepts
200h study · 3yr validity · 50 CPE · $75/yr CE fee
Threat detection and analysis
250h study · 3yr validity · 50 CPE · $75/yr CE fee
Sign up free to explore these topics with AI-powered guidance.
You're producing finished intelligence, writing detection signatures from your analysis, and building threat models that inform security architecture. You're developing attribution skills and starting to track campaigns.
Analyzing C2 infrastructure reveals adversary operational patterns and enables campaign tracking
Application Layer Protocol (T1071), Proxy (T1090)
Tracking how actors acquire infrastructure, tools, and capabilities enables early warning intelligence
Acquire Infrastructure (T1583), Develop Capabilities (T1587)
CTI lifecycle, reporting, and dissemination
300h study · 4yr validity · 36 CPE · $479/yr
Threat intelligence analysis methodology
200h study · 3yr validity · 120 CPE · $80/yr
Sign up free to explore these topics with AI-powered guidance.
You're shaping your organization's intelligence requirements, briefing executive leadership, and building relationships with intel-sharing communities. Your assessments influence strategic security investments.
Understanding data targeting and exfiltration methods reveals adversary strategic objectives
Data from Information Repositories (T1213), Exfiltration Over C2 Channel (T1041)
Assessing destructive capabilities - ransomware, wipers, sabotage - informs strategic risk assessments for leadership
Data Encrypted for Impact (T1486), Data Destruction (T1485)
Security leadership and governance
400h study · 3yr validity · 40 CPE · $125/yr AMF
Advanced malware reverse engineering
350h study · 4yr validity · 36 CPE · $479/yr
Sign up free to explore these topics with AI-powered guidance.
Free to use. No credit card required.
Get Started FreeAsk your first question in seconds.