J-1 Visa Cyber Threat Intelligence Analyst Jobs
Cyber Threat Intelligence Analyst roles in the U.S. are accessible to international professionals through J-1 visa sponsorship, most commonly under the Trainee or Research Scholar category. A State Department-designated sponsor organization issues your DS-2019, while your U.S. employer serves as the host site for your exchange program.
See All Cyber Threat Intelligence Analyst JobsOverview
Showing 5 of 8+ Cyber Threat Intelligence Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 8+ Cyber Threat Intelligence Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cyber Threat Intelligence Analyst roles.
Get Access To All Jobs
INTRODUCTION
If your background is in Cybersecurity, Computer Science and Engineering, Digital Forensics, Management Information Systems, or Security Information Systems, learn more about internships at Charles River Associates!
ABOUT CHARLES RIVER ASSOCIATES
Charles River Associates is a leading global consulting firm that provides economic, financial, and business management expertise to major law firms, corporations, and governments around the world. CRA advises clients on economic and financial matters pertaining to litigation and regulatory proceedings, and guides corporations through critical business strategy and performance-related issues. Since 1965, clients have engaged CRA for its combination of industry experience and rigorous, fact-based analysis that provide clients with clear, implementable solutions to complex business concerns. Practices seeking to hire interns with this profile include (hiring locations listed):
- Forensic Services/Cybersecurity & Digital Forensics (Boston, Chicago, Dallas, New York, Washington DC)
+ Our team supports cyber due diligence, incident response, insurance claims, and security transformation.
- Forensic Services/E-Discovery (Boston, Chicago, New York)
+ Our team assists companies and their counsel in data preservation, collection, analysis, reporting, and delivery from cloud-based and other repositories.
POSITION OVERVIEW
Our Summer Analyst/Associate Internship program mirrors the analyst experience to give you an understanding of our business and experience project work at Charles River Associates. Throughout the 8-10 week program, Analyst/Associate Interns work alongside senior colleagues to deliver live client consulting projects within the practice area. Along the way, you’ll benefit from professional development and wellness support programs, social events to connect you with peers, and a collegial work environment. Successful interns will be offered a full-time position following graduation.
During the Cyber and Forensic Technology Analyst/Associate Internship program, you may work on many aspects of a project:
- Assist with security and privacy investigations in response to data security matters, which may include ongoing breaches and fraud;
- Engage in problem solving and forensic analysis of digital information using standard computer forensic and evidence handling techniques and tools;
- Apply investigative techniques, scientific reasoning, and digital forensic techniques against various systems to answer questions;
- Identify, research, and organize information to determine what a hacker did to a compromised system, whether data was stolen from a company asset, or what data to assess and provide in a litigation;
- Defensibly collect digital evidence and complete chain-of-custody documentation;
- Leverage your programming, model building, and database administration skills (including using Python, T-SQL, VBA, Excel, C#, and/or other programming languages and tools);
- Share investigative and analytical findings, and assist with the drafting of written reports to summarize procedures performed and findings;
- Stay current with developments in digital forensics, e-discovery, and incident response.
DESIRED QUALIFICATIONS
- Bachelor’s or Master’s (non-MBA) degree candidates graduating December 2026/Summer 2027 with a related academic focus (Cybersecurity, Computer Science and Engineering, Digital Forensics, Management Information Systems, or Security Information Systems or related);
- Familiarity with several core skills:
+ Strong understanding of computer operating systems, software, and hardware;
+ Ability to conduct detailed forensic investigations and analyses of computers, networks, mobile devices, and removable media;
+ Experience with conducting digital forensic analyses using commercial and open-source forensic tools, including file system forensics, memory analysis, and network analysis;
+ Experience with conducting static/dynamic malware analyses in a lab environment and threat hunting in a live environment;
+ Understanding of proper evidence handling procedures and chain-of-custody;
+ Experience with drafting technical and investigative reports and communicating technical findings;
+ Experience with utilizing automation tools and scripts to expedite analyses;
+ Understanding of incident handling procedures, including preparation, identification, containment, eradication, and recovery-to-protect enterprise environments;
+ Understanding of common attack techniques used by an adversary on a victim network and how to leverage those techniques to stop further adversary activity;
+ Individuals with digital forensics/incident response training and/or certifications, including SANS GIAC (GCIA, GCFA, GCFE, GNFA, GCCC, and/or GREM), IACIS (CFCE or CIFR), and/or Guidance Software (EnCE), are preferred but not required.
- Effective written and oral communication skills;
- Demonstrated high level of initiative and leadership;
- Strong teamwork and collaboration capabilities;
- Excellent time management and task prioritization skills;
- Clear and demonstrated interest in consulting through coursework, work experience, activities, or attendance at CRA recruiting events.
TO APPLY
To be considered for the Summer 2026 Analyst/Associate Internship program, we require:
- Resume – please include current address, personal email, and telephone number;
- Cover letter – please describe your interest in CRA and how this role matches your goals. Also, please note if you have interest in a particular practice and/or a location preference;
- Transcript – may be unofficial. Note: you must be graduating from a bachelor's or master's degree program for this role. If you are graduating from an MBA/PhD program or have work experience, please visit our Careers site to see current open roles. If you are interested in applying for one of our international locations, please visit our Careers site to view and apply for available jobs. Candidate resume review will commence during the fall semester and continue on a rolling basis until positions are filled.
WORK LOCATION FLEXIBILITY
CRA creates a work environment that enables our colleagues to benefit from being together in the office to best deliver on our promise of career growth, mentorship, and inclusivity. At the same time, we realize that individuals realize a range of benefits when working from home periodically. We currently ask that individuals spend 3 to 4 days a week on average working in the office, with specific days determined in coordination with your practice or team.
OUR COMMITMENT TO EQUAL EMPLOYMENT OPPORTUNITY
Charles River Associates is an equal opportunity employer (EOE). All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, status as a protected veteran, or any other protected characteristic under applicable law.
The city of New York and the District of Columbia require CRA to include a good-faith estimate of the wage range for this role. This range is specific to individuals applying to work in our New York and Washington DC offices and considers several factors including but not limited to experience, education level, and expertise. A good-faith estimate of the base wage range for this role is $30 - $36 per hour; actual total compensation may also include benefits and bonus.
See all 8+ Cyber Threat Intelligence Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cyber Threat Intelligence Analyst roles.
Get Access To All JobsTips for Finding J-1 Visa Sponsorship as a Cyber Threat Intelligence Analyst
Document your threat intelligence specialization early
Gather evidence of your technical focus before applying: certifications like GCTI or CEH, threat research reports you've authored, and tools you've operationalized. Designated sponsors evaluate Trainee applicants on demonstrated specialization, not just job titles.
Target host employers with active SOC teams
Cyber Threat Intelligence Analyst roles exist inside security operations centers, not just IT departments. Focus your search on organizations with dedicated threat intel functions, since J-1 training plans require a defined host-site supervisor and structured learning objectives.
Search Migrate Mate to find J-1-aligned roles
Use Migrate Mate to identify U.S. employers posting Cyber Threat Intelligence Analyst positions that align with J-1 program structures, filtering by role type so you can prioritize outreach to host sites already familiar with exchange visitor programs.
Check whether your role triggers the two-year rule
Analyst positions sponsored through government-funded programs or certain Research Scholar categories can trigger the two-year home residency requirement. Confirm your eligibility for a waiver before accepting an offer, since this affects your ability to change status later.
Align your training plan to intelligence cycle phases
Designated sponsors require a detailed training plan for Trainee applicants. Structure yours around the intelligence cycle: collection, processing, analysis, and dissemination. Sponsors and consular officers look for a clear learning progression, not a list of job duties.
Verify your host employer meets DS-2019 issuance criteria
Before your designated sponsor can issue your DS-2019, the host employer must demonstrate financial stability and adequate supervision capacity. Ask your intended employer directly whether they've hosted J-1 exchange visitors before and whether they're prepared to sign the training plan.
Cyber Threat Intelligence Analyst jobs are hiring across the US. Find yours.
Find Cyber Threat Intelligence Analyst JobsCyber Threat Intelligence Analyst J-1 Visa: Frequently Asked Questions
Which J-1 program category fits a Cyber Threat Intelligence Analyst?
It depends on your career stage. If you're currently enrolled in a degree program, the Intern category applies. If you've graduated within the past year and are building on academic training in cybersecurity or information systems, Trainee is the standard category. Senior professionals conducting formal research in threat intelligence methodology at a university or research institute may qualify under Research Scholar.
Who actually sponsors my J-1 visa, the employer or someone else?
The visa sponsor is a U.S. Department of State-designated organization, such as Cultural Vistas, CIEE, or IIE, not your employer. The designated sponsor issues your DS-2019 form, monitors your program compliance, and acts as your legal point of contact with the State Department. Your U.S. employer is the host organization where you perform your exchange activities.
How do I find Cyber Threat Intelligence Analyst roles that work with J-1 sponsorship?
Start with Migrate Mate, which lets you search U.S. employer listings specifically filtered for J-1-compatible roles. Because J-1 sponsorship requires employer cooperation in signing a training plan and hosting an exchange visitor, targeting employers already familiar with the program structure significantly reduces friction during the offer and DS-2019 issuance process.
What should my J-1 training plan include for a threat intelligence role?
Your training plan needs to map specific learning objectives to measurable activities. For a Cyber Threat Intelligence Analyst, that means sections covering threat actor profiling, indicator-of-compromise analysis, intelligence platform use, and reporting workflows. Generic descriptions of job duties won't satisfy designated sponsor requirements. Each phase should have a supervisor, a timeline, and a defined skill outcome.
Does the two-year home residency requirement apply to cybersecurity analyst exchange visitors?
It can. The two-year home residency requirement applies when your exchange program is funded by your home government, the U.S. government, or when your home country designates your field as one in need of your skills upon return. Government-funded cybersecurity research placements are a common trigger. Check your DS-2019 and your J-1 visa stamp, which will indicate INA 212(e) if the requirement applies to you.
See which Cyber Threat Intelligence Analyst employers are hiring and sponsoring visas right now.
Search Cyber Threat Intelligence Analyst Jobs