Senior Threat Intelligence Analyst, Crypto
Skills
About the Role
You will develop novel collection strategies and analytic methodologies to surface hidden threat actor activity. You will conduct proactive threat hunting across on-chain and off-chain sources, track and analyze threat actors, campaigns, and illicit networks, and produce high-quality, actionable intelligence reports. You will identify and assess adversary TTPs, infrastructure, and behavior to support detection and attribution, leverage OSINT and other intelligence methods, and collaborate with data, engineering, and product stakeholders to improve analytic capabilities.
Requirements
- Proven experience in threat intelligence cyber intelligence or national security intelligence roles
- Fluency in Russian Chinese (Mandarin or Cantonese) or Arabic for research and analysis is strongly preferred
- Track record of generating net-new intelligence through original hypotheses and investigative work
- Working knowledge of blockchain and cryptocurrency including transaction mechanics and on-chain tracing concepts
- Experience tracking threat actors cybercrime groups or nation-state activity including TTP and infrastructure analysis
- Strong analytical and communication skills with ability to produce clear actionable intelligence reports
- Ability to collaborate cross-functionally with technical and non-technical stakeholders
- Comfort operating in ambiguous low-signal environments and driving independent analytic work
- Hands-on experience with blockchain analysis tools (e.g., Chainalysis Reactor TRM Elliptic) or formal cryptocurrency investigation experience
- Relevant certifications or background in cybersecurity intelligence or investigations (e.g., GIAC CEH Chainalysis Reactor Certification)
Responsibilities
- Develop novel collection strategies and analytic methodologies
- Conduct proactive threat hunting across on-chain and off-chain data sources
- Track analyze and report on threat actors campaigns and illicit networks
- Identify and assess adversary TTPs infrastructure and behavior to support attribution
- Leverage OSINT and other intelligence methods to uncover hidden threats
- Produce high-quality actionable intelligence reports for partners
- Collaborate with data engineering and product teams to enhance intelligence capabilities
- Iterate quickly to scale and optimize threat intelligence production
