Cyber Security Threat Intelligence Analyst at CGI
Montréal, QC, Canada -
Full Time


Start Date

Immediate

Expiry Date

16 Nov, 25

Salary

0.0

Posted On

16 Aug, 25

Experience

3 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Siem, English, Network Infrastructure, French, Cloud Security, Edr, Mdr, Vulnerability Management, Internet, Information Technology, Defense

Industry

Information Technology/IT

Description

POSITION DESCRIPTION:

Location: Montreal, Valcourt, Sherbrooke, Brossard (other locations may be considered)
Security Clearance: Must have or be eligible to obtain Reliability Clearance
We are seeking a proactive bilingual (French/English) Cyber Security Threat Intelligence Analyst to join our IT security team. This role involves tracking emerging cyber threats, analyzing attack trends, and delivering actionable intelligence to safeguard organizational systems and data. The successful candidate will collaborate closely with security teams to enhance detection capabilities, streamline incident response, and strengthen overall security posture.

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities

YOUR FUTURE DUTIES AND RESPONSIBILITIES:

Manage and optimize threat intelligence services and platforms, with focus on monitoring external attack surfaces, dark web activity, brand protection, social media threats, phishing attempts, account compromises, and data leakage.
Assess alerts and intelligence platform outputs, prioritizing actionable incidents and coordinating responses.
Perform research on threat actor infrastructure, malicious domains, phishing campaigns, and social engineering attempts.
Define and support organizational intelligence requirements and ensure they are operationalized effectively.
Gather, analyze, and synthesize information from multiple sources to inform security strategies and vulnerability prioritization.
Produce detailed intelligence reports and present findings to technical teams and leadership, recommending mitigation strategies.
Continuously refine threat intelligence workflows and identify opportunities for automation and efficiency gains.
Monitor the latest developments in advanced persistent threats (APT) and emerging attack techniques.
Mentor junior analysts and contribute to building a culture of knowledge sharing and threat awareness.

REQUIRED QUALIFICATIONS TO BE SUCCESSFUL IN THIS ROLE:

Minimum 5 years’ experience in cybersecurity or related fields.
2–3 years’ experience using threat intelligence platforms and tools.
Advanced OSINT capabilities including domain/DNS investigations, phishing infrastructure analysis, and dark web research.
Strong understanding of internet and network infrastructure for accurate threat validation.
Excellent written and verbal communication for technical and non-technical audiences.
Familiarity with SOC tools (EDR, MDR, XDR, SIEM, vulnerability management, firewalls, cloud security).
Knowledge of adversary tactics, techniques, and procedures (TTPs) and threat analysis frameworks such as MITRE ATT&CK and Cyber Kill Chain.
Experience in creating campaign heatmaps, consuming STIX/TAXII feeds, and operationalizing intelligence reports.
Professional certifications (e.g., GCTI, C|TIA, CRTIA, MITRE ATT&CK Defense) are advantageous.
Bilingual in English and French required.
Education & Experience:
Bachelor’s degree in Information Technology, Cybersecurity, or equivalent professional experience.

LI-AB19

Loading...