IS Cyber Threat Intelligence Analyst HQ

Turner Construction

Location: Position can be performed from any U.S. company office.

Position Description: The Cyber Threat Intelligence Analyst supports theorganization's cybersecurity and digital risk protection program byindependently monitoring, analyzing, and assessing external digital threatstargeting corporate identity, personnel, customers, and brand assets. This roleevaluates online threat activity, conducts structured intelligence analysis,and assesses risk impact to the organization.

The analyst is responsible for correlating open-sourceintelligence (OSINT), external threat data, and internal context to identifypatterns, assess potential business impact, and support response actions. Thisposition contributes to the development of intelligence reporting, threat trendanalysis, and continuous improvement of monitoring and response processes.

Essential Duties & Key Responsibilities

  • Monitor and analyze open-source intelligence (OSINT) to identify threats targeting the organization, its personnel, or customers.
  • Conduct structured investigations into reported online abuse, impersonation campaigns, data exposure, and social engineering attempts.
  • Assess risk and impact of identified threats including reputational, operational, regulatory, and safety implications.
  • Correlate external threats in intelligence with internal telemetry and contextual business information to support escalation decisions.
  • Develop written intelligence reports summarizing findings, threat actor tactics, techniques, and procedures (TTPs), trends, and recommended mitigation actions.
  • Identify recurring patterns or emerging campaigns and provide actionable recommendations to reduce exposure.
  • Coordinate with Cyber Security Operation, Legal, Human Resources, Marketing, Physical Security, Senior Management and business teams to ensure appropriate containment, documentation, and mitigation actions are taken.
  • Contribute to refinement of playbooks and documentation standards to improve repeatability and consistency.
  • Track threat intelligence metrics, key risk indicators (KRIs) and develop executive-level threat reports as required.
  • Support vendor coordination and third-party takedown processes when malicious domains, fraudulent accounts, or impersonation sites are identified.
  • Maintain awareness of relevant regulatory considerations, including privacy and data protection requirements under U.S. federal and state laws and GDPR where applicable.
  • Participate in tabletop exercises, threat briefings, and cross-functional risk discussions related to external threat exposure.
  • Other activities, duties, and responsibilities as assigned.

Job Alerts

Get notified when new positions matching your interests become available at {organizationName}.

Need Help?

Questions about our hiring process or want to learn more about working with us?