Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy, and consent to receive emails from Rise
Jobs / Job page
Cyber Threat Research Intelligence Analyst image - Rise Careers
Job details

Cyber Threat Research Intelligence Analyst

This role is four days onsite at our Wilmington Center, Wilmington, DE location, with the flexibility to work from home one day per week

Overview:   

Responsible for gathering, analyzing, and interpreting intelligence data to identify potential threats to M&T Bank's security. Uses this information to proactively to inform how Cybersecurity should strengthen defenses, mitigate threats, and enhance security posture. Manages the end-to-end indicator of compromise (IOC) lifecycle (intake, normalization, enrichment, scoring, dissemination, and retirement) to ensure high-fidelity intelligence reaches security controls quickly and safely. 

Primary Responsibilities:

  • Independently collect and analyze intelligence data from various sources 

  • identify relevant information, and report findings to senior analysts and leaders for further review. 

  • Define and maintain indicator quality standards (source reliability, scoring, false-positive handling, freshness/decay) and ensure governance is applied consistently 

  • Monitor the IOC lifecycle: intake, normalization, de-duplication, enrichment, confidence scoring, deconfliction, expiration/TTL, and feedback loops. 

  • Operationalize IOCs by partnering with Cybersecurity Operations Center/Hunt/Detection Engineering teams to convert intelligence into detections, blocklists, and response actions. 

  • Document clear and concise threat intelligence findings into standardized format to incorporate into threat intelligence briefings for broader Cybersecurity team or leadership. 

  • Contribute insights from internal analysis for intelligence sharing initiatives with other organizations, information sharing groups, and industry groups. 

  • Analyze historical data and patterns to anticipate future threats and recommend proactive techniques to strengthen defenses. 

  • Attribute observed activities to a specific threat actor or group based on known tactics, techniques, and procedures. 

  • Monitor current events and emerging technologies to recognize potential correlations with evolving threat landscape, and communicate to cybersecurity teams to adjust internal technologies, policies, and procedures. 

  • Engage with vendors for routine security products or solutions support. 

  • Identify opportunities for tuning and development of threat intelligence platform’s rules, alerts, and correlation logic and share with security engineering. 

  • Manage day-to-day operations of threat intelligence systems, ensuring they are calibrated and functioning as needed. 

  • Collaborate across Cybersecurity and Technology to ensure appropriate threat intelligence is received and shared. 

  • Understand and adhere to the Company’s risk and regulatory standards, policies, and controls in accordance with the Company’s Risk Appetite. Design, implement, maintain, and enhance internal controls to mitigate risk on an ongoing basis. Identify risk-related issues needing escalation to management. 

  • Complete other related duties as assigned

Scope of Responsibilities:

  • Partners with peers, manager, and Cybersecurity team. 

  • Leverages established directions, policies, and guidelines to accomplish work. Work is reviewed for accuracy and overall quality. 

  • Determines and develops approaches to solutions. Work is evaluated upon completion to ensure objectives have been met. Work is accomplished with periodic check-ins for alignment and limited direction. 

  • Working knowledge of Open-Source Intelligence (OSINT) and social monitoring tools, Threat Intelligence Platform (TIP), Darkweb and malware research tools and understands how intelligence is processed and distributed through an IOC pipeline into downstream security controls. 

Education and Experience Required:

  • Bachelor's degree and a minimum of 3 years’ relevant work experience, or in lieu of a degree, a combined minimum of 7 years’ higher education and/or work experience

  • Minimum of 1 years' experience utilizing tools, techniques, and methodologies analyzing and mitigating cyber-attack stages, including reconnaissance, scanning, enumeration, access escalation, privilege escalation, exploitation, and obfuscation

  • Intermediate understanding of cyber-attack stages, including reconnaissance, scanning, enumeration, access escalation, privilege escalation, exploitation, and obfuscation  

Education and Experience Preferred:

  • Understanding of different types of threat actors, and intermediate understanding of motivations and methodologies 

  • Industry recognized cybersecurity or technology certifications 

  • Technical understanding of networking and routing protocols, services, structures, architecture, and designs supporting modern communication networks 

  • Experience evaluating, analyzing, and synthesizing large quantities of data which may be fragmented and contradictory and accurately determining the potential range and scope of threats. 

  • Experience designing or operating IOC processing pipelines 

  • Experience integrating intelligence with Security Incident and Event Management (SIEM) and Endpoint Detection and Response (EDR) workflows and validating efficacy via telemetry (hits, false positives, decay). 

  • Experience establishing IOC governance and measurement. 

  • Understanding of financial crimes and how threat intelligence can assist in its mitigation. 

#LI-JB3 #Hybrid

M&T Bank is committed to fair, competitive, and market-informed pay for our employees. The pay range for this position is $106,700.00 - $177,900.00 (USD). The successful candidate’s particular combination of knowledge, skills, and experience will inform their specific compensation.

Location

Wilmington, Delaware, United States of America

Average salary estimate

$142300 / YEARLY (est.)
min
max
$106700K
$177900K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

Similar Jobs

Western Alliance Bank seeks a Principal Engineer II to architect and lead Infrastructure-as-Code and automation strategies for secure, compliant, enterprise-scale Azure environments.

Photo of the Rise User
Posted 12 hours ago

DYOPATH is hiring a SNOC Engineer II (Security) to lead incident detection and response while improving operational reliability across security, network, systems, and cloud in a remote capacity.

Photo of the Rise User

Contribute to healthcare application delivery as an Associate Technical Analyst by converting business needs into clear technical requirements, supporting testing, defect management, and system improvements.

Photo of the Rise User
Posted 21 hours ago

Crypto.com's Security Team seeks a Security IT Support Engineer to own endpoint lifecycle, patching, access management, and vulnerability remediation while helping teams adopt AI safely.

Provide white-glove technical support to senior leadership at RRS Group, ensuring secure, reliable devices and flawless meeting/AV experiences across office, remote, and travel settings.

Photo of the Rise User
Saalex Hybrid No location specified
Posted 1 hour ago

Experienced systems engineers are sought to design and integrate enterprise IT systems for Navy LVC environments, supporting system implementation, testing, and performance analysis.

Photo of the Rise User
Saalex Hybrid No location specified
Posted 13 hours ago

Saalex Corporation is hiring Field Service Engineer II to lead on-site installation, integration, and sustainment of mission-critical IT and network systems for Navy and DoD field operations.

Photo of the Rise User
Posted 13 hours ago

Adoreal is hiring a hands-on Senior Manager of IT & Engineering to build the IT/security function, lead HIPAA compliance, and provide .NET technical leadership in a hybrid US-remote role with preference for candidates near Chicago, IL.

Posted 13 hours ago

Onsite IT Support role in Cambridge, MA providing first- and second-level support, workstation setup, and ticket resolution for an international IT services firm.

Photo of the Rise User
Kaseya Careers Hybrid United States - Remote
Posted 24 minutes ago

An experienced Senior Network Engineer is needed to design, maintain, and secure Kaseya's datacenter and edge network infrastructure while driving automation and operational excellence in a fully remote role.

Posted 13 hours ago

Support Kestra’s leadership teams as an AI Enablement Intern by creating tailored training, workshops, and a prompt library to accelerate adoption of M365 Copilot and other generative AI tools.

Photo of the Rise User
Posted 7 hours ago

Crusoe is seeking a Senior Systems Engineer - IAM to lead Okta-based identity lifecycle, automation, and secure access integrations for its global technology infrastructure in San Francisco.

Photo of the Rise User
Posted 6 hours ago

Provide Tier 1 technical support across corporate, distribution, and retail channels for Abercrombie & Fitch, resolving incidents, fulfilling requests, and helping associates use supported systems and devices.

MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, hybrid
DATE POSTED
April 3, 2026
Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!