PitchMeAI
Target

Sr Cybersecurity Analyst - Cyber Threat Intelligence (CTI)(Remote Or Hybrid)

Target · Minneapolis, MN

  • On site
  • Full-time
  • $158,000 / year
  • Minneapolis, MN

Job highlights

  • Analyze cyber threats to protect Target.
  • Collect and analyze threat data from sources.
  • Develop expertise on cybercriminal groups.
  • Produce intelligence reports and briefings.
  • Collaborate with security teams.

About the role

Sr Cybersecurity Analyst - Cyber Threat Intelligence

Join Target as a Sr Cyber Threat Intelligence Analyst and contribute to a team that helps families discover the joy of everyday life. This role supports the identification, collection, analysis, production, and dissemination of intelligence on cyber threat activity that may pose a risk to Target. You will convert threat reporting, technical indicators, and internal security context into insights that inform detection, response, and risk prioritization.

About the Role

As a Sr Cyber Threat Intelligence Analyst on Target’s Cyber Threat Intelligence (CTI) team, you will play a crucial role in safeguarding Target from cyber threats. You will work closely with fellow CTI analysts and cross-functional security partners to understand and communicate cyber threat activity relevant to Target. A successful candidate will demonstrate analytic rigor, technical curiosity, sound judgment, and the ability to operate independently while collaborating across teams to strengthen analytic tradecraft and advance CTI capabilities.

Key Responsibilities

  • Serve as an all-source cyber threat intelligence analyst supporting operational and tactical CTI priorities through the collection, evaluation, cataloging, and analysis of threat information from internal telemetry, external reporting, open-source research, vendor sources, peer communities, and security investigations.
  • Analyze indicators of compromise, threat actor TTPs, intrusion patterns, malware behaviors, infrastructure, vulnerabilities, and campaign activity to generate actionable intelligence for Target.
  • Develop and maintain subject-matter expertise on cybercriminal groups, emerging threats, technology platforms, and threat vectors relevant to Target’s operating environment.
  • Partner with CSIRT, Reverse Engineering, Threat Management, Vulnerability Management, and other security teams to contextualize threats, support investigations, and refine detection and response efforts.
  • Draft, edit, and deliver finished intelligence products and briefings, including threat assessments, actor profiles, incident support reporting, and recurring intelligence updates.
  • Apply structured analytic techniques and frameworks such as the intelligence cycle, Diamond Model, Cyber Kill Chain, MITRE ATT&CK, and threat hunting methodologies to identify patterns, support judgments, and communicate analytic confidence.
  • Identify opportunities to improve CTI processes, tools, collection requirements, analytic workflows, and dissemination methods; partner with Threat Intelligence Engineering and cross-functional teams to automate and streamline workflows.
  • Coordinate with trusted external peer groups, industry communities, and information-sharing partners to exchange intelligence, maintain awareness of the broader cyber threat landscape, and influence outcomes that advance CTI priorities.

Qualifications

  • 4-year degree in Cyber Security, Intelligence Studies, Security Studies, International Relations, Political Science, Computer Science or equivalent industry experience.
  • 3+ years of experience in information security, preferably in cyber threat intelligence, security operations, incident response, threat hunting, malware analysis, or another investigative cyber role, with understanding of malware analysis fundamentals, indicator development, infrastructure analysis, and detection or response support.
  • Experience tracking cybercriminal, nation-state, high-grade, or other cyber threat actors using internal and external data sources, with knowledge of current threat techniques, vulnerability disclosures, data breach incidents, malware trends, social engineering methods, and security analysis techniques.
  • Extensive experience producing intelligence products and briefings for incident response, detection engineering, security operations, leadership, or business stakeholders, with strong verbal, written, and presentation skills and the ability to translate complex technical concepts into clear and business-relevant language.
  • Demonstrated ability to collect, analyze, synthesize, and interpret qualitative and quantitative data from multiple sources; develop threat expertise; identify complex actor behavior patterns; and produce actionable judgments with appropriate analytic confidence.
  • Experience applying analytic frameworks and methodologies such as the intelligence cycle, Diamond Model, Cyber Kill Chain, MITRE ATT&CK, and structured analytic techniques.
  • Experience using digital investigation and intelligence tools such as VirusTotal, VMRay, DomainTools, URLScan, Maltego, Analyst Notebook, or comparable platforms along with strong online research skills across technical, open-source, social media, forum, and traditional sources.
  • Exceptional problem-solving skills, intellectual curiosity, attention to detail, and ability to operate effectively in a fast-paced environment that includes supporting time-sensitive security investigations.
  • Excellent communication skills with the ability to speak to both business and technical teams as well as translate ideas between them.
  • Self-driven and results oriented; able to meet tight timelines.
  • Motivated, team player with ability to collaborate effectively across global team.

Work Arrangement

This position may be considered for a Remote or Hybrid (known internally at Target as "Flex for Your Day") work arrangement based on Target's needs. A Remote work arrangement means the team member works full-time from home or an alternate location that's not a Target location, does not have a desk at a Target location and may travel to HQ up to 4 times a year. A Hybrid/Flex for Your Day work arrangement means the team member's core role may be performed either remote or onsite at a Target location depending upon what your role, team and tasks require for that day. Work duties cannot be performed outside of the country of the primary work location, unless otherwise prescribed by Target.

Benefits

Target offers eligible team members and their dependents comprehensive health benefits and programs, which may include medical, vision, dental, life insurance and more. Other benefits for eligible team members include 401(k), employee discount, short term disability, long term disability, paid sick leave, paid national holidays, and paid vacation. Learn more about benefits eligibility at https://tgt.biz/BenefitsForYou_D.

Americans With Disabilities Act (ADA)

In compliance with state and federal laws, Target will make reasonable accommodations for applicants with disabilities. If a reasonable accommodation is needed to participate in the job application or interview process, please reach out to candidate.accommodations@HRHelp.Target.com.

Key skills/competency

  • Cyber Threat Intelligence
  • All-Source Analysis
  • Threat Actor TTPs
  • Indicator of Compromise Analysis
  • MITRE ATT&CK Framework
  • Intelligence Cycle
  • Malware Analysis
  • Risk Prioritization
  • Security Operations
  • Incident Response

Skills & topics

  • Cybersecurity Analyst
  • Cyber Threat Intelligence
  • Threat Analysis
  • Intelligence Analyst
  • Information Security
  • Security Operations
  • Incident Response
  • Threat Hunting
  • Malware Analysis
  • MITRE ATT&CK

How to get hired

  • Tailor your resume: Highlight experience in cyber threat intelligence, incident response, and threat hunting, emphasizing analysis of TTPs and indicators of compromise.
  • Showcase analytical skills: Emphasize your experience with structured analytic techniques and frameworks like MITRE ATT&CK and the Intelligence Cycle in your application.
  • Quantify achievements: Use numbers to demonstrate the impact of your intelligence products and contributions to detection and response efforts.
  • Prepare for technical questions: Be ready to discuss your experience with specific CTI tools and methodologies, and how you apply them to real-world scenarios.
  • Demonstrate collaborative spirit: Highlight your ability to work effectively with diverse security teams and communicate complex technical information clearly.

Technical preparation

Master MITRE ATT&CK framework.,Practice structured analytic techniques.,Familiarize with CTI tools.,Understand threat actor TTPs.

Behavioral questions

Describe a complex threat analysis.,How do you handle ambiguous data?,How do you collaborate with other teams?,How do you manage tight deadlines?

Frequently asked questions

What are the remote work options for the Sr Cybersecurity Analyst - Cyber Threat Intelligence role at Target?
The Sr Cybersecurity Analyst - Cyber Threat Intelligence position at Target offers flexible work arrangements. It can be considered for a fully Remote position or a Hybrid 'Flex for Your Day' model, depending on Target's needs and your role's requirements. Remote work means full-time from home without a desk at a Target location, with occasional HQ travel. Hybrid allows flexibility to work remote or onsite as tasks require.
What kind of benefits can I expect as a Sr Cybersecurity Analyst at Target?
Target provides eligible team members with comprehensive benefits, including medical, vision, dental, and life insurance. Additional benefits encompass a 401(k) plan, employee discounts, short-term and long-term disability, paid sick leave, paid national holidays, and paid vacation. Detailed information on benefits can be found at https://tgt.biz/BenefitsForYou_D.
What is the required experience for the Sr Cybersecurity Analyst - Cyber Threat Intelligence position at Target?
To be considered for the Sr Cybersecurity Analyst - Cyber Threat Intelligence role at Target, you generally need a 4-year degree in a relevant field (like Cyber Security or Computer Science) or equivalent industry experience. You should also have at least 3 years of experience in information security, with a preference for cyber threat intelligence, security operations, incident response, or threat hunting, including knowledge of malware analysis and indicator development.
How does Target handle accommodations for applicants with disabilities for the Sr Cybersecurity Analyst role?
Target is committed to compliance with state and federal laws regarding reasonable accommodations for applicants with disabilities. If you require an accommodation to participate in the job application or interview process for the Sr Cybersecurity Analyst - Cyber Threat Intelligence role, please contact candidate.accommodations@HRHelp.Target.com.
What are the core analytical frameworks used by Target's Cyber Threat Intelligence team?
Target's Cyber Threat Intelligence team utilizes established analytical frameworks and methodologies. These include the intelligence cycle, the Diamond Model, Cyber Kill Chain, and the MITRE ATT&CK framework, alongside structured analytic techniques to inform judgments and communicate confidence in threat assessments.
What tools might I use as a Sr Cybersecurity Analyst at Target?
As a Sr Cybersecurity Analyst at Target, you can expect to utilize a range of digital investigation and intelligence tools. Common platforms include VirusTotal, VMRay, DomainTools, URLScan, Maltego, and Analyst Notebook, among comparable tools, to support your research and analysis.