Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Senior Cloud Intelligence Analyst image - Rise Careers
Job details

Senior Cloud Intelligence Analyst

Who We Are

Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber threats. We’re a cyber security company who protects, supports and empowers organizations to make better security decisions so they can focus on their mission without fear of cyber threats.


The combination of our market-defining technology and expertise prevents breaches every day and sets a new standard for partnership in the industry. We’re united in our commitment to customers and grounded in our values, which earned us a place on Built In's 2025 Best Places to Work list. If our mission resonates with you, let’s talk.


What We Believe In

- Do what’s right for the customer

- Be kind and authentic

- Deliver great quality

- Be relentless


Challenges You'll Solve

The Red Canary Intelligence Team conducts in-depth analysis to provide context and help prioritize where to focus detection and response efforts. As a key contributor, you will investigate raw telemetry, analyze suspicious and confirmed threats, and conduct open-source research to associate activity with known adversaries. A significant focus is on researching identity-based threat actors and  cloud-targeted TTPs  across infrastructure services like AWS, GCP, and Azure, as well as platform services such as Okta, EntraID, and Kubernetes. Curiosity, adaptability, and a passion for addressing evolving threats will be vital for success in this dynamic, mission-driven team.


The role requires strong collaboration, outstanding communication, and experience in open-source threat research. A solid understanding of cyber threat intelligence and adversary behaviors is essential, alongside proficiency in analytical and problem-solving skills. Responsibilities include developing intelligence on emerging threats, producing actionable intelligence reports, defining new threat clusters, and identifying opportunities to bolster our  detection and response capabilities. Additionally, you will engage with internal teams, external partners, customers and the broader infosec community to communicate unique trends and noteworthy threat actor TTPs through blogs and presentations. This role involves staying updated on emerging threats, suggesting workflow improvements, and supporting customers in understanding and responding to their specific threat models.


If you bring a mix of these skills, we encourage you to apply—even if you don’t meet every requirement. The role will adapt to the person who joins.


What You'll Do
  • Research known and emerging threats with cloud and SaaS providers, including AWS, GCP, Azure, Office 365, and Google Workspaces
  • Investigate telemetry and malicious activity to identify threats, provide context, and guide detection and response decisions. Work with Engineers and Data Scientists to ensure relevant data from Cloud and Identity telemetry sources are properly stored and indexed for historical analysis at scale.
  • Conduct open and closed source research to associate suspicious activity with known threats and to communicate threats of concern to our customers. Sources include social media, blog posts, intelligence reports, sandbox output, private information sharing partners, internal detections, and more.
  • Process and analyze patterns and trends in detections and write actionable intelligence products  to track TTPs, detection coverage, and remediation strategies.
  • Define and analyze new activity clusters based on analysis of malicious and suspicious behaviors and activity observed across our customer base.
  • Produce intelligence reports and communicate actionable insights based on analysis, both internally and externally to customers and the community.
  • Actively engage with internal teams, external partners, customers, and the infosec community to share knowledge and enhance collaboration.
  • Respond to customer questions about threats to help them understand their threat model, what matters to their organization, and what actions they can take in response to various threats.
  • Validate Red Canary’s detection coverage against the continuously evolving threat landscape and identify unique or emerging threats to build detection coverage for.
  • Mentor team members and contribute to the development of intelligence analysis expertise. Suggest new methods, processes, and products that the team could adopt to help us achieve our mission and improve our workflows.


What You'll Bring
  • Experience with, or a drive to research, cloud and SaaS providers, including AWS, GCP, Azure, Office 365, and Google Workspaces, and cloud attack techniques or cloud-based threat groups.
  • Proficiency in analytical problem-solving, quick learning of tools, and familiarity with query languages and data platforms like SQL, Splunk, Elasticsearch, Synapse Storm, or others.
  • Strong analytical and problem-solving skills, including the ability to synthesize complex and contradictory information.
  • Experience in open-source threat research, including social media, blog posts, and malware sandboxes.
  • Knowledge of cyber threat intelligence concepts including attribution, group naming, making assessments, and pivoting..Familiarity with the mechanics of attack behaviors and MITRE ATT&CK ®.
  • Experience tracking adversaries, including threat groups, activity groups, or malware families, and ability to differentiate unique and shared characteristics of clusters.
  • Outstanding communication skills, both written and verbal, including the ability to communicate technical concepts in a clear, succinct fashion to subject matter and non-subject matter experts alike.
  • Experience in Intelligence,  Security Operations Center (SOC), Digital Forensics and Incident Response (DFIR), or other security-focused roles
  • Curiosity and adaptability to dive into data, tackle new challenges, and thrive in a fast-paced environment.


The targeted base salary for this role is $140,000 - $170,000 per year. This role is also eligible for participation in the company's bonus program, and eligible for a grant of stock options, subject to the approval of the company's board of directors. The application deadline is April 25th, 2025.


*** Colorado law requires an estimated closing date for job postings. Please don't be discouraged from applying if you see this date has passed ***


Benefit Highlights:

- 100% Paid Premiums:  Red Canary offers a 100% paid plan option for medical, dental and vision for you and your dependents. No waiting period.

- Health & Wellness - Access to mental health services, Employee Assistance Program and additional programs to incentivize healthy habits.  

- Fertility Benefits: All new hires are eligible for benefits as of their first day.

- Flexible Time Off: Take the time you need to recharge including vacation, sick, bereavement, jury duty, and holidays. 

- Paid Parental Leave- Full base pay to bond/care for your new child.

- Pre-Tax Plans - Red Canary offers a variety of plans to fit you and your dependent specific needs including FSA, HRA and HSA, with employer funding to offset out of pocket health care expenses. 

- Flexible Work Environment- With 60% remote workforce, Canaries can work virtually from almost anywhere in the US.


Why Red Canary?

Red Canary is where people embody our mission to improve security outcomes for all. People work hard to maintain a culture that encourages authenticity in order to do your best work. Our people are driven and committed to finding the best security outcomes, delivering real and actionable answers, and being transparent along the way. 


At Red Canary, we offer a very rich benefits program to our full-time team members so they can focus on their families and improving our customers’ security. For a full list of benefits, please review our Benefits Summary:

https://resource.redcanary.com/rs/003-YRU-314/images/RedCanary_2025BenefitsSummary.pdf?version=0


Individuals seeking employment at Red Canary are considered without regard to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, or sexual orientation.

Red Canary Glassdoor Company Review
3.7 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
Red Canary DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Red Canary
Red Canary CEO photo
Brian Beyer
Approve of CEO

Average salary estimate

$155000 / YEARLY (est.)
min
max
$140000K
$170000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Senior Cloud Intelligence Analyst, Red Canary

Are you ready to take your career to the next level as a Senior Cloud Intelligence Analyst at Red Canary? We’re on a mission to empower organizations to make impactful decisions without the looming threat of cyber attacks. In this remote role, you’ll dive deep into the world of cyber threat intelligence, analyzing raw telemetry and conducting open-source research to help prioritize detection and response efforts. You’ll focus on cloud and SaaS providers like AWS, GCP, and Azure, analyzing suspicious activities and associating them with known adversaries. Your curiosity and adaptability will shine as you collaborate with engineers and data scientists to ensure that threat detection is precise and effective. You'll not only research emerging threats but also create actionable intelligence reports that guide our internal teams and clients alike. Communication is key in this role as you will share insights through blogs and presentations, ensuring that everyone understands the evolving threat landscape. Whether it's mentoring team members or engaging with customers, your role will be dynamic and essential to our mission. If you have a strong background in cyber threat intelligence, analytical problem-solving skills, and a real passion for security, we want you to join our incredible team at Red Canary, where we truly embody kindness, authenticity, and a relentless pursuit of excellence.

Frequently Asked Questions (FAQs) for Senior Cloud Intelligence Analyst Role at Red Canary
What are the main responsibilities of a Senior Cloud Intelligence Analyst at Red Canary?

As a Senior Cloud Intelligence Analyst at Red Canary, your primary responsibilities will involve investigating telemetry, analyzing suspicious activities, and conducting thorough research on identity-based threats in cloud environments. You'll create actionable intelligence reports, engage with customers to understand their threat models, and deliver insights that will help strengthen their defense mechanisms against cyber threats.

Join Rise to see the full answer
What qualifications should a candidate have for the Senior Cloud Intelligence Analyst position at Red Canary?

Candidates applying for the Senior Cloud Intelligence Analyst role at Red Canary should possess experience with cloud and SaaS providers, proficiency in analytical problem-solving, and strong skills in open-source threat research. Familiarity with query languages such as SQL and data platforms is essential, as is an understanding of cyber threat intelligence concepts and attack behaviors.

Join Rise to see the full answer
How does the role of Senior Cloud Intelligence Analyst contribute to Red Canary's mission?

The Senior Cloud Intelligence Analyst plays a crucial role in Red Canary's mission by investigating emerging threats and providing actionable intelligence that helps organizations defend against cyber attacks. By analyzing trends in suspicious activities and sharing insights with both internal teams and external clients, you will directly impact how organizations respond to potential threats, ensuring they can focus on their core missions without fear.

Join Rise to see the full answer
What kind of tools and technologies will a Senior Cloud Intelligence Analyst use at Red Canary?

As a Senior Cloud Intelligence Analyst at Red Canary, you will work with a variety of tools and technologies including data platforms like Splunk and Elasticsearch, as well as query languages like SQL. You'll also utilize research tools to analyze open and closed sources to correlate suspicious activity with known threats, ensuring that our detection capabilities are robust and effective.

Join Rise to see the full answer
What is the expected salary range for the Senior Cloud Intelligence Analyst position at Red Canary?

The targeted base salary for the Senior Cloud Intelligence Analyst role at Red Canary ranges from $140,000 to $170,000 per year. In addition, this position is eligible for a bonus program and stock options upon approval by the company's board of directors.

Join Rise to see the full answer
Common Interview Questions for Senior Cloud Intelligence Analyst
Can you explain how you would approach investigating a suspicious activity in a cloud environment?

To investigate suspicious activity in a cloud environment, I would start by gathering telemetry and identifying anomalies in log data. I'd utilize open-source intelligence to correlate this activity with known threat actor tactics and techniques. Finally, I would analyze the data to provide context and actionable insights for detection and response.

Join Rise to see the full answer
What experience do you have with cloud and SaaS providers relevant to the role of Senior Cloud Intelligence Analyst?

I have hands-on experience working with several cloud and SaaS providers, including AWS and Azure, where I've analyzed security incidents and implemented detection strategies. This experience has provided me with a solid understanding of cloud-based threats and the unique challenges they present.

Join Rise to see the full answer
How do you stay updated on the latest trends in cyber threats?

To stay updated on the latest trends in cyber threats, I regularly follow industry blogs, attend webinars, and participate in threat intelligence sharing communities. Networking with fellow professionals also allows me to exchange insights and best practices in threat research.

Join Rise to see the full answer
Describe a time you had to communicate complex technical information to a non-technical audience.

In a previous role, I presented threat intelligence findings to a non-technical audience. I simplified complex technical terms by using analogies and avoided jargon, ensuring the audience could grasp the severity and implications of the threats without getting bogged down in technical details.

Join Rise to see the full answer
What is your experience with analyzing patterns in cyber threat data?

I have a significant background in analyzing cyber threat data, which includes recognizing patterns and behaviors indicative of threats. Using tools like Splunk, I’ve been able to identify trends over time, which helped shape our response strategies for more effective threat mitigation.

Join Rise to see the full answer
How do you prioritize threats in your analysis?

I prioritize threats based on the potential impact and likelihood of occurrence. I assess the context of threats, including sophistication and targets, and consider the organizational environment to ensure that the most relevant and urgent threats are addressed first.

Join Rise to see the full answer
What role does collaboration play in your approach to threat intelligence?

Collaboration is vital in threat intelligence. I believe that engaging with internal teams, external partners, and clients enhances our understanding of the threat landscape. By sharing insights and collaborating on analyses, we can develop more comprehensive defense strategies.

Join Rise to see the full answer
Can you explain your familiarity with the MITRE ATT&CK framework?

I am well-versed in the MITRE ATT&CK framework, which I use to map out adversary behaviors during investigations. This helps in understanding how different techniques can be used in attacks and in developing mitigation strategies for the most common TTPs relevant to our environment.

Join Rise to see the full answer
What strategies do you implement to improve detection coverage?

To improve detection coverage, I analyze existing telemetry data, validate detection capabilities against known threat actor tactics, and identify gaps. I also stay informed about emerging threats and suggest workflows and processes that can enhance our detection strategies.

Join Rise to see the full answer
How do you mentor less experienced team members in threat intelligence?

I mentor less experienced team members by sharing knowledge through regular training sessions and constructive feedback. I encourage a culture of curiosity where they can ask questions, and I provide them with resources to deepen their understanding of threat intelligence methodologies and tools.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 11 days ago

Join Red Canary as a Commercial Account Executive and help small businesses enhance their cybersecurity solutions while enjoying abundant earning potential.

Photo of the Rise User

Join Red Canary as a Marketing Operations Manager to optimize marketing strategies and enhance security outcomes for organizations.

Photo of the Rise User

As an Advanced Cloud Architect, you will leverage your expertise to support innovative biomedical research initiatives at ARPA-H.

As a Technology Specialist (Data & AI) at Microsoft, you'll leverage data and AI to address customer challenges and foster innovation.

Photo of the Rise User
Posted 14 days ago
Inclusive & Diverse
Mission Driven
Collaboration over Competition
Growth & Learning

Lead global cloud operations for Degreed as a Senior DevOps Manager, ensuring high availability and security across Azure and GCP.

Posted 5 days ago

Join Kraft Heinz as a Global IT Architecture Intern and make a difference in IT within a dynamic global organization.

Photo of the Rise User

Join Highmark as a Lead IT Infrastructure Engineer and spearhead the design and maintenance of vital mainframe systems.

Join Cal State Fullerton as an Information Technology Consultant, delivering critical technical support and training to enhance educational experiences.

Join a pioneering pharmaceutical company as a Senior Manager of IT Operations and Security to make a tangible impact on patient care.

Photo of the Rise User
QODE Hybrid No location specified
Posted 8 days ago

Join a dedicated team at a Government Municipality requiring a Senior GIS Application Analyst skilled in managing cloud-based GIS solutions.

Red Canary was founded to make security for every business better by protecting organizations around the world from cyber threats. Our combination of market-defining technology, processes, and expertise delivered using an innovative SaaS model is ...

69 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, remote
DATE POSTED
April 16, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!