InvoiceCloud Logo

InvoiceCloud

Cyber Threat Analyst

Posted 14 Days Ago
Remote
Hiring Remotely in US
110K-130K Annually
Mid level
Remote
Hiring Remotely in US
110K-130K Annually
Mid level
The Cyber Threat Analyst identifies and analyzes cyber threats, enhancing security measures through threat intelligence, detection engineering, and collaboration with technical teams.
The summary above was generated by AI

About InvoiceCloud

InvoiceCloud is a fast-growing fintech leader recognized with 20 major awards in 2025, including USA TODAY and Boston Globe Top Workplaces, multiple SaaS Awards wins for Best Solution for Finance and FinTech, and national customer service honors from Stevie and the Business Intelligence Group. Judges also highlighted our mission to reduce digital exclusion and restore simplicity and dignity to how people pay for essential services, as well as our leadership in AI maturity and responsible innovation. It’s an award-winning, purpose-driven environment where top talent thrives. To learn more, visit InvoiceCloud.com. 

Job Details:

We are seeking a highly analytical and proactive Cyber Threat Analyst to support the Cybersecurity organization. This role plays a critical part in strengthening InvoiceCloud’s proactive defense posture by identifying, analyzing, and operationalizing emerging cyber threats across the enterprise.

As a subject matter expert in threat intelligence, threat hunting, and detection engineering, this individual integrates intelligence into actionable detection and response improvements. The Cyber Threat Analyst partners closely with SOC, DevSecOps, Architecture, and Engineering teams to ensure threat-informed design, improved alert fidelity, and measurable enhancements to security controls.

This is a highly specialized role requiring strong analytical depth, structured problem-solving, and the ability to translate complex attacker behaviors into clear defensive strategies. Success in this role means consistently turning intelligence insights into operational outcomes—improving visibility, reducing false positives, strengthening detections, and communicating risk clearly to both technical teams and executive stakeholders.

The ideal candidate combines deep knowledge of MITRE ATT&CK, behavioral detection methodologies, and modern telemetry analysis with the ability to build repeatable workflows, support system design with threat modeling, and influence cross-functional partners without direct authority.

Success Profile:

This role is anchored in our company’s core competencies. These competencies reflect the mindsets and behaviors that define success in this role. We outline how each competency translates into real-world actions and outcomes specific to this role.

Results Driven

  • Leads Threat Intelligence Collection & Analysis by collecting, evaluating, and synthesizing intelligence from internal telemetry, OSINT, vendor feeds, advisories, and community reporting, producing actionable outputs that measurably strengthen defensive posture.
  • Executes proactive Threat Hunting & Behavioral Detection initiatives using endpoint, network, identity, and cloud telemetry, developing hypotheses aligned to MITRE ATT&CK and validating findings through evidence-based analysis that results in improved detections and controls.
  • Drives measurable improvements in Detection Engineering & SIEM Correlation by tuning existing rules, reducing false positives, recommending new detections based on attacker tradecraft, and increasing alert fidelity across the environment.
  • Delivers documented 30-, 150-, and 210-day outcomes including detection coverage improvements, closed visibility gaps, reduced triage friction, and executive-ready reporting demonstrating quantifiable risk reduction. 

Takes Ownership

  • Formalizes and operationalizes Threat Modeling & Secure Design Support during system and application design phases by identifying abuse cases, mapping likely attacker paths, and providing clear mitigation guidance to Engineering and Architecture teams.
  • Builds and maintains a structured intelligence-to-detection workflow (intake → analysis → ATT&CK mapping → detection/enrichment → validation → measurement), ensuring accountability and transparency from insight to operational impact.
  • Partners closely in Cross-Functional Collaboration with SOC, DevSecOps, and Architecture teams to embed threat intelligence into playbooks, response readiness, and control improvements while supporting incident response with attribution hypotheses and tradecraft insights.
  • Develops and publishes forward-looking 6- and 12-month threat-intelligence and threat-hunting maturation plans aligned to business priorities, clearly communicating coverage gaps, emerging risks, and strategic improvements to Security leadership and the CISO 

Drives Efficiency

  • Enhances Detection Engineering & SIEM Correlation processes by introducing structured ATT&CK mapping, telemetry validation, enrichment workflows, and standardized reporting templates that reduce friction and improve repeatability.
  • Establishes repeatable Threat Hunting & Behavioral Detection cadences, aligning hunts to prioritized attack surfaces, industry threat trends, and known adversary techniques to ensure consistent coverage over time.
  • Standardizes Reporting & Communication outputs including recurring threat briefings, campaign summaries, and risk trend analyses that translate technical findings into prioritized, defensible recommendations for both technical and non-technical stakeholders.
  • Brings order to threat-intelligence workflows by refining taxonomy standards, confidence scoring, relevance ranking, telemetry validation practices, and feedback loops across stakeholders. 

Innovative

  • Advances Threat Hunting & Behavioral Detection capabilities through hypothesis-driven analysis and multi-dimensional thinking that uncovers stealthy or sophisticated attacker activity beyond signature-based detections.
  • Leverages automation and scripting (e.g., Python or PowerShell) to enrich indicators, normalize data, generate reports, streamline intelligence triage, and improve the speed and scalability of intelligence-to-detection workflows.
  • Continuously evaluates emerging threat actor campaigns, tooling, and industry trends, translating intelligence insights into adaptive defensive strategies that strengthen InvoiceCloud’s proactive defense posture. 

Requirements

  • Bachelor’s degree in Information Security, Cybersecurity, or a related field (or equivalent experience).
  • 3–5 years of experience in threat intelligence, SOC analysis, threat hunting, detection engineering, or related cybersecurity roles.
  • Strong understanding of the MITRE ATT&CK framework and modern attacker tactics, techniques, and procedures (TTPs).
  • Experience working with SIEM, EDR, cloud, and identity telemetry to investigate threats and improve detections.
  • Ability to conduct hypothesis-driven threat hunts and translate findings into actionable detection or control improvements.
  • Experience analyzing and operationalizing threat intelligence from both internal and external sources.
  • Scripting or automation experience (e.g., Python, PowerShell) preferred.
  • Strong analytical and problem-solving skills with the ability to communicate technical findings clearly to diverse audiences.
  • Relevant certifications such as CISM, CISA, GCTI, CTIA, CEH, or similar credentials are a plus.
  • Ability to thrive in a fast-paced, collaborative environment and handle sensitive information with professionalism and discretion.

Base salary is one component of total compensation. Employees may also be eligible for an annual bonus or commission. Some roles may also be eligible for overtime pay. The above represents the expected base compensation range for this job requisition. Ultimately, in determining your pay, we’ll consider many factors including, but not limited to, skills, experience, qualifications, geographic location, and other job-related factors. 

Base Compensation Range
$110,000$130,000 USD

InvoiceCloud is committed to providing equal employment opportunities to all employees and applicants. We do not tolerate discrimination or harassment of any kind based on race, color, religion, age, sex, nationality, disability, genetic information, veteran or military status, sexual orientation, gender identity or expression, or any other characteristic protected under applicable laws.

This commitment applies to all aspects of employment, including recruitment, hiring, placement, promotion, termination, layoff, recall, transfer, leave, compensation, and training.

If you require a disability-related or religious accommodation during the application or recruitment process, and wish to discuss possible adjustments, please contact [email protected].

Click here to review InvoiceCloud’s Job Applicant Privacy Policy.

For recruitment agencies: InvoiceCloud does not accept unsolicited resumes from agencies. Please do not forward resumes to our job aliases, employees, or any other company location. InvoiceCloud is not responsible for any fees associated with unsolicited submissions.

Top Skills

Edr
Mitre Att&Ck
Powershell
Python
SIEM
HQ

InvoiceCloud Braintree, Massachusetts, USA Office

30 Braintree Hill Office Park, Braintree, MA, United States, 02184

Similar Jobs

An Hour Ago
In-Office or Remote
Pewaukee, WI, USA
113K-193K Annually
Senior level
113K-193K Annually
Senior level
Artificial Intelligence • Big Data • Healthtech • Information Technology • Machine Learning • Software • Analytics
Manage IT service delivery processes in healthcare, ensuring seamless tech delivery for Epic Revenue Cycle and Patient Access applications. Oversee incident management and collaborate with stakeholders to enhance patient care through IT solutions.
Top Skills: Epic Revenue CyclePatient Access Applications
An Hour Ago
In-Office or Remote
Eden Prairie, MN, USA
132K-227K Annually
Senior level
132K-227K Annually
Senior level
Artificial Intelligence • Big Data • Healthtech • Information Technology • Machine Learning • Software • Analytics
The Principal Architect will design and build intelligent conversational bots, ensuring scalability, security, and alignment with business goals, while leading modernization efforts and backend integrations.
Top Skills: APIsCi/CdCloud-Native ArchitecturesConversational DesignDevOpsLlmMonitoring PracticesNatural Language Understanding
An Hour Ago
In-Office or Remote
Basking Ridge, NJ, USA
92K-164K Annually
Senior level
92K-164K Annually
Senior level
Artificial Intelligence • Big Data • Healthtech • Information Technology • Machine Learning • Software • Analytics
The Senior Technical Product Owner defines and delivers capabilities for AI-driven solutions, managing product backlogs and collaborating with engineering teams to translate business needs into technical requirements.
Top Skills: AhaAIAWSAzureConfluenceDevOpsGCPGitJIRARally

What you need to know about the Boston Tech Scene

Boston is a powerhouse for technology innovation thanks to world-class research universities like MIT and Harvard and a robust pipeline of venture capital investment. Host to the first telephone call and one of the first general-purpose computers ever put into use, Boston is now a hub for biotechnology, robotics and artificial intelligence — though it’s also home to several B2B software giants. So it’s no surprise that the city consistently ranks among the greatest startup ecosystems in the world.

Key Facts About Boston Tech

  • Number of Tech Workers: 269,000; 9.4% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Thermo Fisher Scientific, Toast, Klaviyo, HubSpot, DraftKings
  • Key Industries: Artificial intelligence, biotechnology, robotics, software, aerospace
  • Funding Landscape: $15.7 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Summit Partners, Volition Capital, Bain Capital Ventures, MassVentures, Highland Capital Partners
  • Research Centers and Universities: MIT, Harvard University, Boston College, Tufts University, Boston University, Northeastern University, Smithsonian Astrophysical Observatory, National Bureau of Economic Research, Broad Institute, Lowell Center for Space Science & Technology, National Emerging Infectious Diseases Laboratories

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account