Roadmap

Threat Intelligence Analyst

The analyst who studies adversaries — tracking threat actors, analyzing attack campaigns, producing intelligence that helps the organization defend proactively rather than react after the fact.

OPTIMISTIC 18-24 monthsREALISTIC 2-4 years

FAQ

Common questions

How long does it take to become a Threat Intelligence Analyst?

18–24 months optimistic at 20–25 hours/week, 2–4 years realistic. CTI typically requires 1–2 years in a SOC or security analyst role first because operational security depth — understanding how attacks actually work — is required before you can meaningfully analyze them. CTI adds research, writing, intelligence tradecraft, and platform management on top of operational security depth. Pure self-taught paths exist but rarely match SOC-experience-plus-CTI-specialization candidates.

Which certifications matter for CTI roles?

GCTI (GIAC Cyber Threat Intelligence) is the most-listed CTI cert by significant margin and maps to SANS FOR578. CySA+ as baseline. EC-Council CTIA appears less frequently but consistently. MITRE ATT&CK Defender (MAD) is emerging. CTI tradecraft (structured analytical techniques, estimative language, confidence levels) distinguishes CTI analysts from security analysts who 'also look at threat intel.'

Do I need a degree?

Helpful but not required. Self-taught CTI analysts with published threat actor profiles, malware analysis writeups, or infrastructure pivot chains compete effectively. Foreign language capability (Russian, Chinese, Farsi) is a significant differentiator in government and advanced commercial CTI roles. What you do need: prior security operations experience, deep MITRE ATT&CK knowledge, OSINT and infrastructure analysis skills, and clear written communication.

What separates a hired Threat Intelligence Analyst?

Published threat intelligence work. A blog post, threat actor profile, or malware analysis write-up publicly available demonstrates real-world production capability. Other differentiators: ATT&CK fluency under pressure (mapping artifacts to specific technique IDs in interview), OSINT pivot chain documentation, and platform experience (deployed and managed MISP or OpenCTI). CTI is a specialized and growing field commanding above-average compensation.

Building your own portfolio?

SEE PRICING →