Blackpoint Cyber is the leading provider of world-class cybersecurity threat hunting, detection and remediation technology. Founded by former National Security Agency (NSA) cyber operations experts who applied their learnings to bring national security-grade technology solutions to commercial customers around the world, Blackpoint Cyber is in hyper-growth mode, fueled by a recent $190m series C round.
Blackpoint Cyber is the leading provider of world-class cybersecurity threat hunting, detection and remediation technology. Founded by former National Security Agency (NSA) cyber operations experts who applied their learnings to bring national security-grade technology solutions to commercial customers around the world, Blackpoint Cyber is in hyper-growth mode, fueled by a recent $190m series C round.
Company Culture
On this team, we value high-quality execution, ownership, and strong morals. With us, principles are never tested, and we are proud to always do right by our customers. If you’re a driven professional with a passion for learning and contributing towards the best, then Blackpoint welcomes you. Our team is energetic and collaborative, maintaining a high-performance culture and enabling growth through overcoming challenges in the modern cyberthreat landscape.
About the Program:
This position is part of the DoD SkillBridge Program designed to provide active-duty service members with the opportunity to gain valuable civilian work experience during their last 180 days of service. As a Jr. CTI Analyst, you will learn the core principles of cyber threat intelligence and how it supports security operations in a real-word environment.
TO BE ELIGIBLE FOR DOD SKILLBRIDGE JOB OPPORTUNITES YOU MUST BE AN ACTIVE MEMBER OF THE U.S. MILITARY WITH 180 DAYS OF SERVICE OR FEWER REMAINING PRIOR TO YOUR DATE OF SEPARATION AND HAVE AT LEAST 180 CONTINUOUS DAYS OF ACTIVE SERVICE
Please only apply if you meet the above requirements and can work the following shift: Monday to Friday 10:00 AM - 6:00 PM ET
Position Overview
The CTI Analyst will work alongside the CTI team to gain hands-on experience in cyber threat analysis, reporting, and intelligence operations. This role includes participating in intelligence gathering, IOC enrichment, threat actor profiling, and collaborating with the Security Operations Center (SOC) to understand how intelligence impacts day-to-day defensive operations.
This is a training-focused role designed for individuals transitioning from the military to cybersecurity careers.
Responsibilities
Learn and apply core concepts of cyber threat intelligence, including the intelligence lifecycle, threat actor TTPs, and MITRE ATT&CK.
Assist in identifying, enriching, and contextualizing indicators of compromise (IOCs) using open-source tools and commercial platforms.
Shadow SOC analysts to understand alert triage workflows and how CTI can support SOC needs.
Support the creation of threat actor profiles, threat notices, and campaign briefs under guidance.
Facilitate information sharing and feedback between CTI and SOC teams to align intelligence outputs with operational requirements.
Participate in the development of actionable intelligence products for technical and non-technical stakeholders.
Contribute to CTI team processes and help identify opportunities for integration and operational improvement.
Required Qualifications
Active duty service member approved for participation in the DoD SkillBridge program.
Basic understanding of cybersecurity concepts and terminology.
Strong analytical and problem-solving skills.
Excellent written and verbal communication skills.
Ability to work collaboratively and independently in a professional environment.
Preferred Qualifications
Familiarity with threat intelligence concepts such as IOCs, TTPs, and threat actor groups.
Exposure to cybersecurity tools (e.g., SIEM, EDR, or threat intelligence platforms).
Interest in pursuing a career in cybersecurity or threat intelligence post-transition.
What You Will Gain
Practical knowledge of CTI tradecraft and tools used in enterprise environments.
First-hand experience working with SOC teams and understanding operational cybersecurity workflows.
Mentorship from experienced CTI professionals.
A capstone project demonstrating applied threat intelligence skills.
A strong foundation for pursuing entry-level cybersecurity roles after military service.
Program Benefits
Smooth transition from military to civilian cybersecurity roles.
Exposure to real-world threat intelligence operations.
Opportunity to contribute to meaningful projects in a supportive learning environment.
Blackpoint Cyber welcomes and encourages applications from qualified individuals of all races, colors, religions, sex, sexual orientation, gender identity or expression, national origin, age, marital status, or any other legally protected status. We are committed to equality of opportunity in all aspects of employment. For eligible employees in the US, Blackpoint offers competitive Health, Vision, Dental, and Life Insurance plans, a robust 401k plan, Discretionary Time Off, and other minor perks.
If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.
An established Chicago trading firm seeks a Senior Linux Systems Engineer to lead low-latency infrastructure, automation, and high-performance systems work on-site.
The University System of Maryland is hiring an Executive Director to lead MDREN’s strategic, operational, and member-focused delivery of advanced network services across Maryland’s education and research community.
MUFG is hiring a Manager of the Emergency Coordination Officer to lead incident routing, triage, and cross-functional coordination for security incidents across the Americas.
Experienced infrastructure engineer needed to maintain and scale American Express’s hybrid cloud IaaS/PaaS platform, ensuring high availability, automation, and smooth production operations.
Lead and grow a high-performing infrastructure operations team at ALSAC, driving automation, security, and resilient platform delivery to support mission-critical systems.
Hyundai MOBIS Corporate Center America is looking for an IT Infrastructure Analyst with 3+ years of hands-on systems and network experience to ensure secure, reliable IT operations across its North American sites.
Provide frontline technical support and ticketing for government customers, troubleshooting break/fix issues and supporting enterprise service-desk workflows.
Provide Epic-focused instructional design and training leadership at Presbyterian Healthcare Services to develop curricula, support trainers, and ensure end-users are prepared to use Epic effectively.
Lead infrastructure and resiliency risk efforts at American Express by managing BCPs, partnering with engineering teams, and translating complex risk data into actionable controls.
Experienced HRIS analyst with strong Lawson HCM skills needed to lead HR systems projects, data conversions, reporting, and process improvements at Prime Healthcare's corporate IT team.
Lead technical strategy and execution for MSC Business Systems as Technical Director, providing systems engineering, DevSecOps, cloud migration, and data/BI/AI leadership in a DoD environment.
Lead Plus Power’s enterprise and operational cybersecurity efforts as Principal Cybersecurity Engineer, building controls, managing compliance and TPRM, and protecting IT/OT/data environments across a 10+ GW energy storage portfolio.
BeyondTrust is hiring a Sr Salesforce Administrator (Contractor) to lead advanced administration, integrations, and mentoring efforts for their remote Salesforce environment.