- Company Name
- Loblaw Companies Limited
- Job Title
- Threat Intelligence Lead
- Job Description
-
**Job Title**
Threat Intelligence Lead
**Role Summary**
Lead the design, execution, and continual improvement of the organization’s threat intelligence program. Transform raw threat data into actionable intelligence that informs SOC, Incident Response, Threat Hunting, and executive decision‑making, while developing and mentoring a high‑performance intelligence team.
**Expectations**
- Develop and maintain a comprehensive threat intelligence strategy aligned with business and security objectives.
- Provide timely, contextual intelligence to technical and executive stakeholders.
- Keep the organization ahead of evolving threat actors, TTPs, and attack vectors.
- Optimize tooling and processes to increase efficiency and effectiveness of intelligence activities.
**Key Responsibilities**
- Define and guide the threat intelligence lifecycle: collection, analysis, production, and distribution.
- Collect intelligence from OSINT, technical feeds, and dark‑web sources; evaluate credibility and relevance.
- Build and maintain detailed threat actor profiles (APT groups, cybercriminal collectives, state‑sponsored actors).
- Produce actionable intelligence reports, briefings, and threat assessments tailored to technical teams and business leaders.
- Partner with SOC, Incident Response, and Threat Hunting teams to incorporate intelligence into investigations, detection rule creation, and defensive controls.
- Lead, coach, and develop a team of threat intelligence analysts, fostering analytical rigor and continuous learning.
- Manage and refine the Threat Intelligence Platform (TIP) and associated analytical tools to streamline workflows and augment sharing capabilities.
- Communicate complex technical findings in clear, business‑impact terms for executive leadership.
- Evaluate and recommend new intelligence tools, data sources, and processes to enhance program effectiveness.
**Required Skills**
- Deep knowledge of cyber threat landscape: APTs, cybercriminal motivations, attack vectors.
- Proficiency with intelligence analysis frameworks: Diamond Model, Cyber Kill Chain, MITRE ATT&CK®.
- Hands‑on experience with TIPs (e.g., MISP, Recorded Future, ThreatConnect) and OSINT collection techniques.
- Strong analytical, critical‑thinking, and data‑synthesis abilities.
- Excellent written and verbal communication, with demonstrated ability to translate technical insight into business risk.
- Leadership and mentoring experience in threat intelligence, threat hunting, or incident response.
**Required Education & Certifications**
- Bachelor’s degree in Cybersecurity, Computer Science, Information Security, International Relations, or related field (preferred).
- Industry certifications highly desirable: CISSP, GCTI, GOSI, or equivalent.