Numerator has released a new job opening for the position of Threat Intel & Anti-Phishing Analyst. This is a remote job opportunity in India, suitable for candidates with strong experience in cybersecurity, threat intelligence, email security, and phishing analysis.
If you have expertise in detecting attacks, monitoring cyber threats, and safeguarding digital platforms, this role offers an exciting career path with a global tech-driven company.
Numerator is known for reinventing market intelligence using advanced data insights. The selected candidate will work closely with SOC, AppSec, Cloud, HR, and Legal teams to proactively detect and respond to cybersecurity threats. Below is the detailed overview of the role.
Organization Overview
Numerator is a fast-growing global analytics and market intelligence company trusted by leading brands and retailers. With more than 5,800 employees worldwide, the company focuses on innovation, technology, diversity, and workplace flexibility.
Numerator provides a supportive, growth-oriented environment along with wellness resources, recharge days, remote-working flexibility, and professional development opportunities.

Post Name
Threat Intel & Anti-Phishing Analyst
Job Location
Remote – India
(Work from home role applicable across multiple regions in India)
Job Type
Full-Time – IT Security
Functional Area
Threat Intelligence, Anti-Phishing, SOC Support, Brand Protection
Job ID
606447
Role & Responsibilities
The Threat Intel & Anti-Phishing Analyst will play a critical role in identifying, monitoring, and mitigating threats targeting the organization. The responsibilities include:
1. Threat Intelligence (TI) Monitoring
The candidate will be responsible for monitoring the dark web, external forums, and breach databases to detect any company-related exposure. They must track emerging threats, TTPs (Tactics, Techniques & Procedures), and sector-specific risks. Maintaining threat intel repositories, IOC feeds, and preparing weekly intelligence summaries will be an essential part of the job.
2. Phishing Investigation & Email Security
The analyst will handle employee-reported phishing emails, perform IOC/URL/header analysis, and work with email security platforms to block malicious campaigns. The role requires understanding SPF, DKIM, DMARC, and tuning configurations for enhanced email security. Detecting typosquatting, spoofing, and domain impersonation also forms a major responsibility.
3. Brand Protection
The candidate must proactively monitor the internet and social platforms for brand impersonation and fraudulent domain activity. Collaboration with HR, Legal, and Communications teams will be needed in cases involving executive or employee impersonation. Managing domain takedown procedures will also be required.
4. Threat Hunting & Incident Response Support
The analyst will work with the SOC team to provide enrichment, threat context, kill chain mapping, and attribution analysis. They will assist with periodic threat-hunting initiatives, validate IOCs, and support investigations for faster incident containment and response.
Eligibility Criteria
Experience Required
Candidates must have at least 4+ years of experience in one or more areas:
- Cyber Threat Intelligence
- SOC operations
- Digital Forensics and Incident Response (DFIR)
- Email Security
- Phishing Analysis & Investigations
This role requires thorough understanding of threat actors, phishing techniques, malware delivery, and social engineering methods.
Essential Skills
Applicants should possess:
- Hands-on experience with TI platforms like Recorded Future, HIBP, Intel471, VirusTotal, Shodan, etc.
- Strong expertise in email header analysis, SMTP flow, and authentication protocols such as SPF/DKIM/DMARC.
- Good understanding of malware behavior, C2 infrastructure, rogue domains, and phishing campaigns.
- Familiarity with IOC formats including STIX, TAXII, MITRE ATT&CK.
- Basic scripting skills (Python/Bash) for automation and enrichment workflows.
- Strong writing and reporting skills to prepare threat advisories and intelligence summaries.
- Ability to work collaboratively across multiple teams under time-sensitive conditions.
Preferred (Nice-to-Have) Skills
Although not mandatory, the following skills will be advantageous:
- Experience with MISP, IRONSCALES, Cofense, PhishTool
- Knowledge of phishing simulation platforms like KnowBe4 or Ninjio
- Exposure to SIEM tools such as Splunk, Sentinel, Elastic
- Experience with brand monitoring, domain takedown processes
- Familiarity with prompt engineering and AI-based automation tools
Why Join Numerator?
Numerator emphasizes flexibility, diversity, and innovation. Employees benefit from:
- Remote working flexibility
- Wellness resources for employees & families
- Recharge days for mental well-being
- Professional development programs
- Inclusive work culture
- Opportunity to work with global teams and cutting-edge security tools
The company values authenticity and encourages employees to bring their unique ideas and backgrounds forward.
How to Apply
Interested candidates meeting the eligibility criteria can apply through the official Numerator careers page. Make sure to upload your updated resume and provide accurate details of your cybersecurity experience and certifications.
| Platform | Apply / Join Links |
|---|---|
| Platform Link | Click Here |
| Official Apply Link | Click Here (Official) |
| WhatsApp Group | Join Here |
| Telegram Group | Join Here |
Conclusion:-
The Threat Intel & Anti-Phishing Analyst position at Numerator is an excellent opportunity for professionals in cybersecurity who want to grow in a dynamic, remote-first environment. If you have strong analytical skills, hands-on threat analysis experience, and a passion for protecting digital assets, this role could be the perfect fit for you.

Leave a Comment