TN Visa Threat Intelligence Analyst Jobs
Threat Intelligence Analyst roles qualify for TN visa sponsorship under the USMCA treaty's Computer Systems Analyst category. Canadian citizens can enter at the border with an employer support letter—no cap or lottery. Mexican citizens apply through a U.S. consulate with an employer support letter and a limited annual allocation. Your employer prepares the support letter documentation before you apply.
See All Threat Intelligence Analyst JobsOverview
Showing 5 of 5+ Threat Intelligence Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 5+ Threat Intelligence Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Threat Intelligence Analyst roles.
Get Access To All Jobs
Who We Are
At Newrez, we bring big thinkers and caring doers together to make home happen. We’re a team built on heart and hustle, united by a commitment to show up for our customers, our communities, and each other. We believe that when our people thrive, homeowners thrive - and that’s why we invest in your growth, wellbeing, and ability to make an impact.
Every day, we work to exceed the expectations of our residential mortgage borrowers and business partners through superior service, simple processes, and clear communication. We do this by empowering our employees, encouraging innovative solutions and recognizing great performance.
Position Summary:
The Senior Threat Intelligence Analyst is a key individual contributor within the Cybersecurity organization, responsible for producing high-quality, actionable intelligence that enables the company to anticipate, detect, and respond to emerging threats. This role serves as a senior member of the Threat Intelligence function with mentorship responsibilities, supporting the development of junior analysts and strengthening intelligence maturity across the broader security organization.
The ideal candidate brings strong analytical rigor, deep understanding of the threat landscape, technical proficiency across modern cloud and hybrid environments, and the ability to translate complex intelligence findings into meaningful insights for both technical and non-technical audiences.
DESCRIPTION:
Essential Functions, Duties, and Responsibilities
Threat Intelligence Collection, Analysis & Production
- Lead intelligence collection and analysis across multiple domains including:
- External attack surface monitoring
- Brand impersonation, domain spoofing, and digital risk
- Threat intelligence support for fraud prevention
- Vulnerability intelligence and exploit monitoring
- Malware trends, threat actor tactics, and campaign activity
- Dark web and deep web monitoring
- Apply the full intelligence lifecycle (requirements, collection, analysis, dissemination, feedback) to produce timely and relevant insights.
- Conduct structured analytic assessments using frameworks such as MITRE ATT&CK, the Diamond Model, and the Cyber Kill Chain.
- Assess emerging threats to cloud environments, SaaS platforms, corporate endpoints, identity systems, and on-premises infrastructure.
Operational & Strategic Intelligence Output:
- Produce clear, actionable intelligence products including:
- Tactical alerts for SOC and Incident Response
- Threat actor profiles and campaign analysis
- Vulnerability prioritization guidance supporting VM and AppSec teams
- Threat hunt leads mapped to ATT&CK
- Weekly/bi-weekly intelligence summaries for operational teams
- Quarterly executive threat landscape briefings
- Support fraud, cyber defense, and engineering teams with tailored intelligence to inform detection engineering, risk mitigation, and control improvements.
Cross-Functional Collaboration:
- Partner with SOC, Incident Response, Vulnerability Management, Application Security, Engineering, Cyber Fraud, Risk, and other business teams to operationalize intelligence.
- Communicate complex technical findings to non-technical stakeholders in a clear, concise manner.
- Serve as a mentor to junior analysts, guiding analytical rigor, reporting quality, and investigative methodology.
- Help mature threat intelligence processes, workflows, and automation opportunities.
Technology & Tooling:
- Leverage enterprise threat intelligence platforms, security information and event management tools, cloud-native security capabilities, log aggregation pipelines, and attack surface monitoring platforms.
- Maintain a vendor-agnostic mindset to ensure intelligence is grounded in outcome-driven analysis rather than tooling.
- Ability to effectively and accurately convey information to others.
- Performs related duties as assigned by management.
Qualifications and Education Requirements:
- 5–8 years of experience in Cyber Threat Intelligence, Security Operations, Incident Response, or a related cybersecurity discipline.
- Experience within the financial sector or other highly regulated industries.
- Certifications such as:
- GCTI (GIAC Cyber Threat Intelligence)
- CTIA (EC-Council Certified Threat Intelligence Analyst)
- GCIA, GNFA, GREM, or similar advanced certifications aligned with senior threat intelligence expectations.
Skills, Abilities, and Knowledge:
- Deep familiarity with:
- Threat intelligence lifecycle
- MITRE ATT&CK framework
- Diamond Model of Intrusion Analysis
- Cyber Kill Chain
- STIX/TAXII standards
- Exposure to multi-cloud environments (Azure, AWS, SaaS ecosystems) and hybrid enterprise architectures.
- Demonstrated experience analyzing threat actor behavior, malware activity, vulnerability exploitation trends, digital risk, and fraud-related intelligence within hybrid cloud environments.
- Strong understanding of adversary TTPs, cybercrime ecosystems, and financially motivated threat activity.
- Effective at managing multiple priorities under tight deadlines in a fast-paced, dynamic environment.
- Strong project management capability.
- Self-directed and comfortable working with ambiguity and uncertainty.
- High degree of professional maturity, integrity, ability to maintain confidential data and information.
- High degree of business acumen; strong technical aptitude.
Work Environment and Physical Requirements:
- Working on-site at assigned office location.
- Regular and punctual attendance adhering to schedule established by leadership.
- Flexibility to work occasional adjusted work schedules, overtime, and evening and/or weekend hours to meet deadlines or as business needs demand.
- Working in a cubicle hub, maintaining focus on phone calls in a noisy environment within earshot of multiple other conversations.
- Sedentary work in a stationary position at a cubicle for prolonged periods of time.
- Constant repetitive motions required for operating a computer, such as typing and managing phone calls.
- Constantly communicating effectively verbally in English, including accurately exchanging information with others following identification of correct procedures.
Additional Information:
While this description is intended to be an accurate reflection of the position’s requirements, it in no way implies/states that these are the only job responsibilities. Management reserves the right to modify, add or remove duties and request other duties, as necessary.
All employees are required to have smart phones that meet Company security standards with the ability to install apps such as Microsoft Authenticator. Employment will be contingent on this requirement.
Why Newrez
We’re a great place to work because we invest in what matters: your career, your community, your wellbeing, and your future. Our total rewards package is designed to support your whole self.
Company Benefits:
We offer benefits, programs, and perks that support you in every aspect of your life.
- Medical, dental, and vision insurance
- Health Savings Account with employer contribution
- 401(k) Retirement plan with employer match
- Paid Maternity Leave/Parental Bonding Leave/Caregiver Leave
- Adoption Assistance
- Tuition & Certification reimbursement
- Employee Mortgage Loan Program
- The Newrez Employee Emergency and Disaster Fund is a program to support our team members experiencing hardships
Newrez NOW:
Through Newrez NOW, our Corporate Social Responsibility program, you’ll have opportunities to give back, lead, and make a difference.
- 1 company-paid Volunteer Time Off day (with over 40,000 volunteer hours contributed since our inception)
- Matching Gifts Program - dollar-for-dollar up to $1,000
- Access to grants, nonprofit resources, and volunteer opportunities
- More than $6,000,000 donated since 2020
- 1 in 5 employees participates in at least one Employee Resource Group (ERG)
Equal Employment Opportunity
We're proud to be an equal opportunity employer - and celebrate our employees' differences, including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. Different makes us better.

Who We Are
At Newrez, we bring big thinkers and caring doers together to make home happen. We’re a team built on heart and hustle, united by a commitment to show up for our customers, our communities, and each other. We believe that when our people thrive, homeowners thrive - and that’s why we invest in your growth, wellbeing, and ability to make an impact.
Every day, we work to exceed the expectations of our residential mortgage borrowers and business partners through superior service, simple processes, and clear communication. We do this by empowering our employees, encouraging innovative solutions and recognizing great performance.
Position Summary:
The Senior Threat Intelligence Analyst is a key individual contributor within the Cybersecurity organization, responsible for producing high-quality, actionable intelligence that enables the company to anticipate, detect, and respond to emerging threats. This role serves as a senior member of the Threat Intelligence function with mentorship responsibilities, supporting the development of junior analysts and strengthening intelligence maturity across the broader security organization.
The ideal candidate brings strong analytical rigor, deep understanding of the threat landscape, technical proficiency across modern cloud and hybrid environments, and the ability to translate complex intelligence findings into meaningful insights for both technical and non-technical audiences.
DESCRIPTION:
Essential Functions, Duties, and Responsibilities
Threat Intelligence Collection, Analysis & Production
- Lead intelligence collection and analysis across multiple domains including:
- External attack surface monitoring
- Brand impersonation, domain spoofing, and digital risk
- Threat intelligence support for fraud prevention
- Vulnerability intelligence and exploit monitoring
- Malware trends, threat actor tactics, and campaign activity
- Dark web and deep web monitoring
- Apply the full intelligence lifecycle (requirements, collection, analysis, dissemination, feedback) to produce timely and relevant insights.
- Conduct structured analytic assessments using frameworks such as MITRE ATT&CK, the Diamond Model, and the Cyber Kill Chain.
- Assess emerging threats to cloud environments, SaaS platforms, corporate endpoints, identity systems, and on-premises infrastructure.
Operational & Strategic Intelligence Output:
- Produce clear, actionable intelligence products including:
- Tactical alerts for SOC and Incident Response
- Threat actor profiles and campaign analysis
- Vulnerability prioritization guidance supporting VM and AppSec teams
- Threat hunt leads mapped to ATT&CK
- Weekly/bi-weekly intelligence summaries for operational teams
- Quarterly executive threat landscape briefings
- Support fraud, cyber defense, and engineering teams with tailored intelligence to inform detection engineering, risk mitigation, and control improvements.
Cross-Functional Collaboration:
- Partner with SOC, Incident Response, Vulnerability Management, Application Security, Engineering, Cyber Fraud, Risk, and other business teams to operationalize intelligence.
- Communicate complex technical findings to non-technical stakeholders in a clear, concise manner.
- Serve as a mentor to junior analysts, guiding analytical rigor, reporting quality, and investigative methodology.
- Help mature threat intelligence processes, workflows, and automation opportunities.
Technology & Tooling:
- Leverage enterprise threat intelligence platforms, security information and event management tools, cloud-native security capabilities, log aggregation pipelines, and attack surface monitoring platforms.
- Maintain a vendor-agnostic mindset to ensure intelligence is grounded in outcome-driven analysis rather than tooling.
- Ability to effectively and accurately convey information to others.
- Performs related duties as assigned by management.
Qualifications and Education Requirements:
- 5–8 years of experience in Cyber Threat Intelligence, Security Operations, Incident Response, or a related cybersecurity discipline.
- Experience within the financial sector or other highly regulated industries.
- Certifications such as:
- GCTI (GIAC Cyber Threat Intelligence)
- CTIA (EC-Council Certified Threat Intelligence Analyst)
- GCIA, GNFA, GREM, or similar advanced certifications aligned with senior threat intelligence expectations.
Skills, Abilities, and Knowledge:
- Deep familiarity with:
- Threat intelligence lifecycle
- MITRE ATT&CK framework
- Diamond Model of Intrusion Analysis
- Cyber Kill Chain
- STIX/TAXII standards
- Exposure to multi-cloud environments (Azure, AWS, SaaS ecosystems) and hybrid enterprise architectures.
- Demonstrated experience analyzing threat actor behavior, malware activity, vulnerability exploitation trends, digital risk, and fraud-related intelligence within hybrid cloud environments.
- Strong understanding of adversary TTPs, cybercrime ecosystems, and financially motivated threat activity.
- Effective at managing multiple priorities under tight deadlines in a fast-paced, dynamic environment.
- Strong project management capability.
- Self-directed and comfortable working with ambiguity and uncertainty.
- High degree of professional maturity, integrity, ability to maintain confidential data and information.
- High degree of business acumen; strong technical aptitude.
Work Environment and Physical Requirements:
- Working on-site at assigned office location.
- Regular and punctual attendance adhering to schedule established by leadership.
- Flexibility to work occasional adjusted work schedules, overtime, and evening and/or weekend hours to meet deadlines or as business needs demand.
- Working in a cubicle hub, maintaining focus on phone calls in a noisy environment within earshot of multiple other conversations.
- Sedentary work in a stationary position at a cubicle for prolonged periods of time.
- Constant repetitive motions required for operating a computer, such as typing and managing phone calls.
- Constantly communicating effectively verbally in English, including accurately exchanging information with others following identification of correct procedures.
Additional Information:
While this description is intended to be an accurate reflection of the position’s requirements, it in no way implies/states that these are the only job responsibilities. Management reserves the right to modify, add or remove duties and request other duties, as necessary.
All employees are required to have smart phones that meet Company security standards with the ability to install apps such as Microsoft Authenticator. Employment will be contingent on this requirement.
Why Newrez
We’re a great place to work because we invest in what matters: your career, your community, your wellbeing, and your future. Our total rewards package is designed to support your whole self.
Company Benefits:
We offer benefits, programs, and perks that support you in every aspect of your life.
- Medical, dental, and vision insurance
- Health Savings Account with employer contribution
- 401(k) Retirement plan with employer match
- Paid Maternity Leave/Parental Bonding Leave/Caregiver Leave
- Adoption Assistance
- Tuition & Certification reimbursement
- Employee Mortgage Loan Program
- The Newrez Employee Emergency and Disaster Fund is a program to support our team members experiencing hardships
Newrez NOW:
Through Newrez NOW, our Corporate Social Responsibility program, you’ll have opportunities to give back, lead, and make a difference.
- 1 company-paid Volunteer Time Off day (with over 40,000 volunteer hours contributed since our inception)
- Matching Gifts Program - dollar-for-dollar up to $1,000
- Access to grants, nonprofit resources, and volunteer opportunities
- More than $6,000,000 donated since 2020
- 1 in 5 employees participates in at least one Employee Resource Group (ERG)
Equal Employment Opportunity
We're proud to be an equal opportunity employer - and celebrate our employees' differences, including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. Different makes us better.
See all 5+ Threat Intelligence Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Threat Intelligence Analyst roles.
Get Access To All JobsTips for Finding TN Visa Sponsorship as a Threat Intelligence Analyst
Align your credentials to the Computer Systems Analyst category
TN eligibility for this role hinges on the Computer Systems Analyst designation. Gather transcripts and any cybersecurity certifications before applying so employers can quickly verify your educational credentials and professional qualifications meet TN requirements for the role.
Target employers with recent visa filing experience
Search Migrate Mate's database of recent visa filings to identify companies that have sponsored work visas for Computer Systems Analyst roles. Those employers already have experience with visa sponsorship and are more likely to be open to supporting qualified candidates in specialized technical positions.
Distinguish your threat intelligence specialization clearly
Many hiring managers conflate threat intelligence with general IT security. In your resume and interviews, connect your specific skills like malware analysis, threat actor profiling, or SIEM platform expertise directly to Computer Systems Analyst duties to make the TN classification clear.
Confirm your employer will prepare support documentation before arrival
Your employer must prepare a support letter documenting your role, qualifications, and salary before you can activate TN status. Raise this in the offer negotiation stage so the letter preparation doesn't delay your start date, particularly for roles requiring security clearances.
Use Migrate Mate to find TN-eligible employers
Filter for Threat Intelligence Analyst roles where employers have recent visa filings, indicating experience with work visa sponsorship. This saves time you'd otherwise spend cold-applying and discovering late in the process that a company may not be prepared to support visa candidates.
Prepare a role-specific support letter for Canadian border entries
Canadian citizens can request TN status directly at a U.S. port of entry, but CBP officers assess each case individually. Bring a detailed employer support letter that maps your threat intelligence duties explicitly to the Computer Systems Analyst category defined under USMCA.
Threat Intelligence Analyst jobs are hiring across the US. Find yours.
Find Threat Intelligence Analyst JobsThreat Intelligence Analyst TN Visa: Frequently Asked Questions
Does a Threat Intelligence Analyst role qualify for a TN visa?
Yes, provided the role is classified under the Computer Systems Analyst category recognized by USMCA. Your duties must center on analyzing systems, identifying vulnerabilities, or evaluating cyber threats at a technical level. Roles that are primarily managerial or lack a direct systems analysis component may face scrutiny, so the job description framing matters.
How does TN visa sponsorship compare to H-1B for this role?
TN has no annual lottery and no cap for Canadian citizens, so you can start working as soon as status is granted rather than waiting for an October 1 start date. H-1B requires employer registration in March, a random lottery selection, and months of USCIS processing. For Threat Intelligence Analysts who already have a job offer, TN is typically faster and more predictable than H-1B.
Where can I find Threat Intelligence Analyst jobs with TN visa sponsorship?
Migrate Mate lists Threat Intelligence Analyst positions where employers have indicated TN visa sponsorship is available. Searching there filters out roles where you'd need to negotiate sponsorship from scratch, which is where most candidates lose time in the process.
What documents do I need to present at the border or consulate as a Threat Intelligence Analyst seeking TN status?
You'll need a valid passport, an employer support letter detailing your threat intelligence duties and their connection to the Computer Systems Analyst category, and evidence of your qualifying credentials such as a bachelor's degree in computer science, information security, or a closely related field. Certifications like CISSP or CEH can supplement but don't replace the degree requirement. For Canadian citizens, present these documents at the U.S. port of entry; for Mexican citizens, submit them with your application at a U.S. consulate.
Can Mexican citizens get TN sponsorship for Threat Intelligence Analyst roles?
Yes, but Mexican citizens must apply through a U.S. consulate rather than at the border, and the annual TN allocation for Mexican nationals is limited. Processing times at the consulate vary, so planning ahead is important. The Computer Systems Analyst category applies equally, and the documentation requirements are the same as for Canadian applicants.
See which Threat Intelligence Analyst employers are hiring and sponsoring visas right now.
Search Threat Intelligence Analyst Jobs