All Classes
blue team Threat Intelligence Analyst

🌿 Druid → Threat Intelligence Analyst

“Know thy enemy. Their tools, their tactics, their motivations. That’s how you stay ahead.”

Your Role in the Party

You understand the threat ecosystem. While others focus on defending specific systems or investigating specific incidents, you study the adversaries themselves—their motivations, capabilities, infrastructure, and evolving techniques. Your intelligence informs defensive priorities, hunt hypotheses, and strategic security decisions.

Threat Intelligence Analysts operate at the intersection of research and security operations. You consume raw data—malware samples, C2 infrastructure, dark web chatter, geopolitical developments—and transform it into actionable intelligence. Your finished products guide how the organization defends itself.

This role rewards curiosity and pattern recognition. The best CTI analysts can track a threat actor across campaigns spanning years, connect dots others don’t see, and anticipate the next move based on historical behavior. If you’ve ever fallen down a research rabbit hole and emerged hours later with insights no one else has, you’re built for this.


📊 Your Stat Spread

StatScoreWhat It Means for You
WIS⭐⭐⭐⭐⭐Pattern recognition is your superpower. You connect threat actor TTPs across campaigns and years.
INT⭐⭐⭐⭐Deep knowledge of adversary techniques, geopolitics, and threat landscape.
DEX⭐⭐⭐⭐Adapt to changing threat landscape. Today’s priority might not be tomorrow’s.
CON⭐⭐⭐Research sprints require focus. Deep-dive analysis on campaigns and actors.
CHA⭐⭐⭐Brief stakeholders on findings. Translate intelligence into actionable recommendations.
STR⭐⭐Analysis over hands-on exploitation. You study attacks; others execute them.

🎭 Neurodivergent Advantages

Your traits are class features, not bugs:

  • Special Interests in Geopolitics: If nation-state actors, hacktivism, or cybercrime ecosystems have ever captured your hyperfocus, that knowledge directly translates to CTI work. Your deep knowledge of specific threat actors is your competitive advantage.

  • Pattern Recognition (WIS): Both ADHD and autistic brains excel at connecting disparate data points. The infrastructure overlap, the code similarity, the TTP pattern that links campaigns—your brain notices what others miss.

  • Long-Term Tracking: Autistic ability to maintain interest in specific topics over years is exactly what tracking threat actors requires. Campaigns span months; groups operate for years. Your persistence pays off.

  • Research Hyperfocus: When you find an interesting thread to pull, you follow it completely. Those deep research sessions produce the intelligence others can’t generate.

  • Systematic Analysis: CTI follows structured methodologies—Diamond Model, Kill Chain, ATT&CK mapping. If your brain craves frameworks, intelligence analysis provides them.

  • Written Communication: Intelligence reports are highly structured written products. If you express yourself better in writing, this role plays to that strength.


🗺️ Career Path

SOC Analyst → Threat Hunter → Threat Intel Analyst → Senior Intel Analyst → Intel Team Lead
       ↓            ↓                ↓                      ↓
  (Foundation)  (Detection       (Production)          (Leadership or
                 Experience)                            Strategic Intel)

Alternative Entry Points:

  • Geopolitical Analyst → CTI Analyst (geopolitical background)
  • Journalist/Researcher → CTI Analyst (OSINT skills)
  • Military Intelligence → CTI Analyst (intelligence methodology)

Common Druid Multiclasses:

  • Druid/Ranger: CTI Analyst → Threat Hunter (apply intel to active hunting)
  • Druid/Monk: CTI Analyst → Malware Researcher (track actors through their tools)
  • Druid/Cleric: CTI Analyst → Third-Party Risk (vendor threat assessment)

📜 Certification Pathway

Level 1-5: Foundation (0-2 years)

CertificationOrgTypeCostWhy It Fits
CompTIA Security+CompTIAMultiple Choice~$425Foundation. Understand security before analyzing threats to it.
CompTIA CySA+CompTIAMultiple Choice~$404Behavioral analysis. Understand detection before producing intel for it.
BTL1 (Blue Team Level 1)Security Blue TeamPractical (24-hr)£399 ($500)Blue team fundamentals including threat intel basics.

Neurodivergent Note: Build operational experience first. CTI is most valuable when you understand what defenders actually need. SOC or hunt experience informs better intelligence production.


Level 6-10: Specialization (2-5 years)

CertificationOrgTypeCostWhy It Fits
GCTI (GIAC Cyber Threat Intelligence)SANS/GIACPractical~$999 (exam) + ~$8,500 (FOR578)Gold standard CTI cert. Full intelligence lifecycle, analytical frameworks, open-book with CyberLive labs.
CTIA (Certified Threat Intelligence Analyst)EC-CouncilMultiple Choice~$1,000-1,700Budget-friendlier option. 15 modules covering CTI lifecycle. Requires 3 years experience or training.
GCFA (GIAC Certified Forensic Analyst)SANS/GIACPractical~$999 (exam) + courseForensic skills inform CTI. Understand artifacts threat actors leave behind.

Neurodivergent Note: GCTI (FOR578) is the premier CTI course—covers Diamond Model, Kill Chain, COA Matrix, and production methodology. CTIA is more accessible if cost is a barrier. Both certifications accelerate CTI careers.


Level 11-15: Advanced (5-8 years)

CertificationOrgTypeCostWhy It Fits
GCIH (GIAC Certified Incident Handler)SANS/GIACPractical~$999 (exam) + ~$8,500 (SEC504)Understand incident response to produce better intel for responders.
GREM (GIAC Reverse Engineering Malware)SANS/GIACPractical~$999 (exam) + courseAnalyze threat actor tools at the code level. Deep technical CTI.
OSINT CertificationsVariousMixed$500-2,000OSINT skills for open-source intelligence collection.

Neurodivergent Note: At this level, specialize based on interest: technical CTI (GREM), operational CTI (GCIH), or strategic intelligence. Your special interest should guide this choice.


Level 16-20: Mastery (8+ years)

CertificationOrgTypeCostWhy It Fits
CISSPISC²Multiple Choice~$749Strategic credibility. Opens doors to leadership and advisory roles.
CISMISACAMultiple Choice~$575 (member)Security management. If leading CTI teams is your goal.

🛠️ Your Toolkit

Primary Weapons

ToolTypeWhat It DoesLink
MITRE ATT&CKFrameworkAdversary behavior framework. Common language for TTPs. Essential.attack.mitre.org
MISPPlatformThreat intelligence sharing platform. IOC correlation, sharing, enrichment.misp-project.org
OpenCTIPlatformOpen-source threat intelligence platform. Graph-based analysis, STIX2 native.opencti.io

Intelligence Platforms

ToolPurposeLink
TheHiveIncident and threat intel managementthehive-project.org
MaltegoVisual link analysis. Connect entities across investigations.maltego.com
Recorded FutureCommercial threat intel platform (industry leading)recordedfuture.com
Mandiant AdvantageThreat intelligence from incident response leadersmandiant.com

OSINT Tools

ToolPurposeLink
ShodanInternet-connected device search. Find adversary infrastructure.shodan.io
CensysInternet asset search. Alternative to Shodan.censys.io
SpiderFootAutomated OSINT collectionspiderfoot.net
HunchlyWeb capture for OSINT investigationshunch.ly
OSINT FrameworkCollection of OSINT tools organized by categoryosintframework.com

Threat Data Sources

SourcePurposeLink
VirusTotalMalware and URL intelligencevirustotal.com
URLhausMalicious URL databaseurlhaus.abuse.ch
MalwareBazaarMalware sample sharingbazaar.abuse.ch
ThreatFoxIOC sharing platformthreatfox.abuse.ch
AlienVault OTXOpen threat exchangeotx.alienvault.com

Fun Tools from Awesome Lists

Source: awesome-threat-intelligence

ToolWhat It Does
YETIYour Everyday Threat Intelligence platform
CRITsCollaborative Research Into Threats
IntelMQAutomated processing of security feeds
HarpoonOSINT CLI tool
TheHarvesterEmail and domain OSINT
Recon-ngWeb reconnaissance framework

📚 Learning Resources

Free Resources

YouTube Channels:

  • SANS Cyber Defense - CTI methodology and case studies
  • Katie Nickels (Red Canary) - ATT&CK and threat intel
  • MITRE ATT&CK - Official technique breakdowns
  • Black Hills Information Security - Threat hunting and intel

Practice & Learning:

Essential Reading:


Books for Druids

BookAuthorWhy Read It
Intelligence-Driven Incident ResponseScott Roberts & Rebekah BrownCTI for incident response. Practical integration.
The Threat Intelligence HandbookRecorded FutureComprehensive CTI methodology. Free from Recorded Future.
Practical Threat Intelligence and Data-Driven Threat HuntingValentina Costa-GazcónCombining CTI with hunting. ATT&CK focused.
The Diamond ModelSergio Caltagirone et al.Core CTI analytical framework. Original paper.
Structured Analytic TechniquesRichards Heuer & Randolph PhersonIntelligence analysis methodology from CIA.
Psychology of Intelligence AnalysisRichards HeuerCognitive biases in analysis. Free from CIA.

Podcasts

PodcastWhy Listen
SANS Internet Storm CenterDaily threat updates
Risky BusinessWeekly security news with intel context
Darknet DiariesThreat actor stories
The CyberWireDaily security intelligence briefing
Malicious LifeHistorical threat actor campaigns

🎓 SANS Courses for Druids

CourseCertFocusBest For
FOR578: Cyber Threat IntelligenceGCTIFull CTI lifecycle and methodologyEssential for all Druids
FOR508: Advanced IR & Threat HuntingGCFAThreat hunting informed by intelOperational CTI
FOR610: Reverse-Engineering MalwareGREMTechnical malware analysisTechnical CTI
SEC487: Open-Source Intelligence (OSINT)GOSIOSINT collection and analysisCollection-focused CTI
SEC599: Defeating Advanced AdversariesGDATPurple team with intel focusUnderstanding adversary perspective

🏆 Building Your Magic Items

Early Career Achievements:

  • Map a threat actor to MITRE ATT&CK
  • Produce your first threat intelligence report
  • Set up a MISP instance
  • Complete TryHackMe CTI path
  • Subscribe to and consume 5 threat intel feeds

Mid-Career Achievements:

  • Track a campaign across multiple reports
  • Earn GCTI certification
  • Present intelligence briefing to stakeholders
  • Contribute to threat intel sharing community
  • Build detection rules from CTI analysis

Senior Achievements:

  • Lead threat intel production for your organization
  • Publish original threat research
  • Speak at a CTI conference (FIRST, CTI Summit)
  • Mentor junior analysts
  • Shape organizational security priorities with strategic intel

🧭 Multiclassing Guide

Adding Ranger Levels (Threat Hunting)

Apply intelligence to active hunting:

  • Use CTI to develop hunt hypotheses
  • SANS FOR508 for hunt methodology
  • Convert intelligence into detection rules

“I don’t just produce intel—I hunt for the threats I track.”

Adding Monk Levels (Malware Analysis)

Track threat actors through their tools:

  • SANS FOR610 for malware reverse engineering
  • Attribute samples to threat actors through code analysis
  • Understand TTPs at the technical level

“I track threat actors through the fingerprints they leave in their malware.”

Adding Cleric Levels (Third-Party Risk)

Combine CTI with vendor risk assessment:

  • Assess vendor exposure to threat actors
  • Supply chain threat intelligence
  • Integrate CTI into procurement decisions

“I assess whether vendors are in the crosshairs of threats targeting our sector.”


💡 Neurodivergent Learning Strategies

For ADHD:

  • CTI’s variety helps—new actors, new campaigns, new geopolitics
  • Use breaking news and current events to maintain interest
  • Switch between collection, analysis, and production tasks
  • The “puzzle” of attribution captures hyperfocus

For Autism:

  • Frameworks (Diamond Model, Kill Chain, ATT&CK) provide satisfying structure
  • Build comprehensive personal databases of threat actors and TTPs
  • Deep-dive on specific threat actors or regions as special interests
  • Written report production plays to common strengths

For Both:

  • Pattern recognition across campaigns is your superpower
  • Long-term tracking of actors suits persistent focus
  • Research hyperfocus produces insights others can’t generate
  • Your attention to detail catches the infrastructure overlap

🎯 Not Sure If You’re a Druid?

Take the Character Creation Quiz to discover your cybersecurity class and get personalized recommendations!


📖 Continue Your Journey


“The adversary evolves. Your intelligence keeps defenders one step ahead.”