Threat Intelligence Analyst
Inetum2
Posted: May 19, 2026
Interested in this position?
Create a free account to apply with AI-powered matching
Quick Summary
Threat Intelligence Analyst is a critical role that requires a strong understanding of threat intelligence and threat modeling, with a focus on identifying and mitigating cyber threats to the company's digital assets and reputation. The ideal candidate should have experience in threat intelligence, threat modeling, and security operations. The role involves analyzing threat intelligence data, identifying potential threats, and developing mitigation strategies to protect the company's digital assets.
Required Skills
Job Description
Inetum is a European leader in digital services. Inetum’s team of 28,000 consultants and specialists strive every day to make a digital impact for businesses, public sector entities and society. Inetum’s solutions aim at contributing to its clients’ performance and innovation as well as the common good.  
Present in 19 countries with a dense network of sites, Inetum partners with major software publishers to meet the challenges of digital transformation with proximity and flexibility.  
Driven by its ambition for growth and scale, Inetum generated sales of 2.5 billion euros in 2023.  
We are looking for a Threat Intelligence Analyst to strengthen our cybersecurity area, with a strong focus on Threat Hunting, Threat Intelligence, and Malware Reverse Engineering. This role will play a critical part in the proactive identification of threats, the production of Indicators of Compromise (IOCs), and the continuous support of the organization’s defensive posture.
Key Responsibilities:
• Conduct proactive Threat Hunting across internal and external environments, including the dark web and deep web, identifying malicious campaigns, data leaks, unauthorized access, and attack preparation activities.
• Perform Threat Intelligence activities, analyzing threat trends, TTPs (Tactics, Techniques and Procedures), and relevant adversary activity.
• Execute malware reverse engineering, both static and dynamic, to identify malicious behaviors.
• Use and master malware analysis tools, including sandboxes, debuggers, and isolated environments.
• Produce, validate, and correlate Indicators of Compromise (IOCs), supporting Blue Team and SOC operations.
• Work closely with Red Team, Blue Team, and SOC teams, contributing to the maturity of the Purple Team practice.
• Minimum of 3 years of experience in roles such as Threat Intelligence Analyst or Purple Team Analyst or similar.
• Strong hands‑on experience in Threat Hunting and Threat Intelligence.
• Solid knowledge of malware reverse engineering (static and dynamic analysis).
• Proven experience in the collection, analysis, and correlation of IOCs.
• Experience with Vulnerability Management tools (Nice to Have), such as:• Rapid7 InsightVM
• Tenable Nessus / Tenable.io
• Qualys
• Strong proficiency with malware analysis tools and controlled environments.
• High level of attention to detail and strong analytical skills.
• Ability to work both independently and collaboratively.
• Ongoing interest in emerging threats and advanced research.
Certifications (one or more):
• CTIA – Certified Threat Intelligence Analyst (EC‑Council)
• SANS FOR578 – Cyber Threat Intelligence
• MITRE ATT&CK Defender (MAD) – Purple / Blue
• ISO/IEC 27001 Foundation
• CompTIA Security+
• BTL1 (Blue Team Level 1)
• Workplace type: Hybrid (max. of 3 times per week in the office);
• Location: Picoas, Lisboa.