Threat Intelligence Analyst

Website LockedIn AI

LockedIn AI is the #1 real-time AI interview and meeting copilot, trusted by over one million users worldwide. The company is building an advanced AI-powered career platform that supports users during interviews, coding assessments, and professional meetings by delivering real-time assistance that improves clarity, confidence, and performance.

Role Overview
LockedIn AI is looking for a sharp and analytical Threat Intelligence Analyst to identify, monitor, and assess cyber threats targeting its platform, AI systems, users, and infrastructure. This role focuses on intelligence gathering, adversary tracking, and producing actionable insights that strengthen the company’s security posture.

You will analyze global cyber threat activity, especially threats targeting AI-powered systems such as prompt injection attacks, data scraping, credential theft, phishing campaigns, and model exploitation attempts. Your insights will directly support security engineering, incident response, and executive decision-making.

Key Responsibilities
Threat Monitoring and Analysis
Monitor OSINT sources, dark web forums, threat feeds, and security communities
Analyze attacker behavior, tactics, techniques, and procedures (TTPs)
Track threat actors targeting SaaS, AI systems, and user data
Identify phishing campaigns, credential leaks, and brand impersonation risks
Intelligence Reporting
Produce clear threat intelligence reports for technical and non-technical teams
Deliver tactical alerts, strategic assessments, and incident-focused intelligence
Maintain structured intelligence documentation and threat actor profiles
AI-Specific Threat Research
Analyze AI-related threats such as prompt injection, model extraction, and data poisoning
Map threats using frameworks like MITRE ATLAS and OWASP LLM Top 10
Support engineering teams with AI security insights and mitigation strategies
Incident Support and Detection
Provide threat context during active security incidents
Develop detection rules and indicators of compromise
Assist in post-incident analysis and attribution
Vulnerability and Risk Intelligence
Track newly disclosed vulnerabilities affecting infrastructure and dependencies
Assess exploitability and business impact of security risks
Prioritize remediation based on real-world threat intelligence
Collaboration and Knowledge Sharing
Work closely with engineering, security, and leadership teams
Contribute to internal threat intelligence knowledge base
Participate in external intelligence sharing communities

Required Qualifications
3+ years of experience in threat intelligence or cyber threat analysis
Experience producing actionable security intelligence reports
Strong understanding of OSINT, threat actor profiling, and cyber threat landscapes
Familiarity with SIEM tools and security monitoring systems
Knowledge of MITRE ATT&CK framework
Strong analytical and written communication skills
Ability to work independently in a fast-paced environment

Technical Skills
Cyber threat intelligence tools and OSINT platforms
SIEM tools such as Splunk, Elastic, or Microsoft Sentinel
Basic scripting (Python or similar) for data analysis
Understanding of networking protocols and security fundamentals
Familiarity with threat detection and correlation techniques

Preferred Qualifications
Experience with AI security threats and LLM attack vectors
Background in OSINT investigations or adversary tracking
Familiarity with AI security frameworks like MITRE ATLAS
Experience in SaaS or high-scale consumer tech environments
Contributions to threat intelligence research or communities

What We Offer
Competitive compensation and meaningful equity
Direct impact on a product used by over 1 million users
Remote-first work culture with flexible environment
Opportunity to work at the frontier of AI and security
Fast-paced, high-ownership startup environment

How to Apply
Candidates should submit:

Resume or CV
Short note explaining interest in LockedIn AI
Optional: relevant portfolio, research, or technical writing