Capgemini

Threat Intelligence Analyst

Posted: Nov 14, 2025

Job Description

About The RoleAs a Cyber Threat Intelligence Specialist at Capgemini, you will transform raw data into actionable insights that inform and strengthen our defenses. You’ll monitor and dissect adversary Tactics, Techniques, and Procedures (TTPs), track threat actor campaigns, and evaluate how geopolitical or industry events may shape cyber risks. Your intelligence deliverables—ranging from tactical alerts to strategic trend analyses—will guide SOC analysts, incident responders, and executive leadership alike.ResponsibilitiesIntelligence Collection & AnalysisGather and process cyber threat data from internal logs, open‑source feeds, commercial platforms, and partnerships.Use OSINT and threat‑intelligence platforms (e.g. MISP, OpenCTI, DomainTools) to enrich and correlate indicators of compromise.TTP Monitoring & ReportingIdentify and track evolving TTPs of cyber threat actors, from commodity malware gangs to advanced persistent threats (APTs).Analyze non‑cyber events (political, regulatory, industry) for potential impact on adversary behavior and organizational risk.Actionable Intelligence DeliverablesProduce and disseminate intelligence products at multiple levels:Tactical: IOCs, YARA rules, rapid alerts for SOC ingestionOperational: Campaign analyses, cluster reports, and threat actor profilesStrategic: Quarterly threat landscape briefs, risk assessments, and executive summariesThreat Hunting & CollaborationDesign and support hypothesis‑driven threat hunting campaigns, assisting with data gathering and pre‑processing for the hunt team.Liaise with SOC, incident response, and offensive teams to validate intelligence and refine detection logic.Continuous ImprovementEvaluate and recommend enhancements to our threat‑intelligence tooling, processes, and sharing frameworks.Mentor junior analysts and foster knowledge sharing across the security organization.Required Skills And ExpertiseCore Experience3+ years in a threat intelligence, threat hunting, or related cybersecurity role.Proficient with threat‑intelligence platforms (OpenCTI, MISP) and OSINT tools (DomainTools, VirusTotal, etc.).Solid scripting skills (Python preferred) for data enrichment, indicator processing, and automation.Strong analytical mindset with the ability to distill complex technical findings into clear, concise reports.Excellent verbal and written communication skills for both technical teams and business stakeholders.Technical ExpertiseDeep understanding of threat‑intelligence methodologies and frameworks (e.g., MITRE ATT&CK).Familiarity with cloud environments (AWS, Azure, GCP) and how cloud‑native threats differ from on‑premise.Experience in threat hunting fundamentals: hypothesis creation, data normalization, and query development.Knowledge of legal and ethical considerations in intelligence collection and sharing.Fluent in English; based on the working environment, French / Dutch knowledge is a plus.

Job Application Tips

  • Tailor your resume to highlight relevant experience for this position
  • Write a compelling cover letter that addresses the specific requirements
  • Research the company culture and values before applying
  • Prepare examples of your work that demonstrate your skills
  • Follow up on your application after a reasonable time period

You May Also Be Interested In