{"id":34985,"date":"2022-10-21T08:00:00","date_gmt":"2022-10-21T06:00:00","guid":{"rendered":"https:\/\/www.freelancermap.com\/blog\/?p=34985"},"modified":"2022-10-25T12:50:47","modified_gmt":"2022-10-25T10:50:47","slug":"what-does-cyber-threat-intelligence-analyst-do","status":"publish","type":"post","link":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/","title":{"rendered":"What does a Cyber Threat Intelligence Analyst do?"},"content":{"rendered":"\n<p><strong>A Cyber Threat Intelligence Analyst detects, reports and proposes measures to mitigate cyber threats. The job of the Threat Intelligence Analyst is vital to today&#8217;s large companies, especially those that may be vulnerable to cybercriminals. What is Threat Intelligence? What does a Cyber Threat Intelligence Analyst do on a daily basis? Keep reading to find it out!<\/strong><\/p>\n\n\n<div class=\"mks_col \">\n<div class=\"mks_one_third \"><div class=\"su-box su-box-style-default\" id=\"\" style=\"border-color:#1c1d1f;border-radius:3px;\"><div class=\"su-box-title\" style=\"background-color:#4f5052;color:#FFFFFF;border-top-left-radius:1px;border-top-right-radius:1px\">Role overview<\/div><div class=\"su-box-content su-u-clearfix su-u-trim\" style=\"border-bottom-left-radius:1px;border-bottom-right-radius:1px\"> <span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"#Introduction\">Job Profile<\/a><\/span><br \/>\n<span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"#Responsibilities\">Responsibilities<\/a><\/span><br \/>\n<span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"#Skills\">Skills<\/a><\/span><br \/>\n<span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"#Background\">Background<\/a><\/span><br \/>\n<span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"#Salary\">Salary<\/a><\/span><br \/>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Introduction\">What is Cyber Threat Intelligence?<\/h2>\n\n\n\n<p>Cyber \u200b\u200bThreat Intelligence (CTI) or simply Threat Intelligence is a discipline that <strong>uses concrete evidence and context analysis to mitigate cyber threats.<\/strong> In other words, cyber threat intelligence produces information about computer threats that allows them to be prevented or mitigated.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-src=\"https:\/\/lh3.googleusercontent.com\/ChgqtT3WNvWw0noIVn4odkMD16n3SWww6eVtouJL7pX1vTMoOkDv7iIxxTyjGaXzF3bNrn_ZinU7mPATLwLQXRB7Jb1tdouUma-74BaB3VODJUpUgq-YwiJJZfXmEakUIRsVGzzmCt4KzsJ4nbDm4_WdkFl0TjNiimuMhJGULb5Co-SsFbJk5_VkwQ\" alt=\"Role Overview - Cyber Threat Intelligence Analyst\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><figcaption>Role Overview &#8211; Cyber Threat Intelligence Analyst<\/figcaption><\/figure>\n\n\n\n<p>This approach is different from that of <a href=\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-security-consultant-do\/\">cybersecurity<\/a> and far from replacing it &#8211; it <strong>essentially complements it.<\/strong><\/p>\n\n\n\n<p>Cybercriminals are becoming more sophisticated. Sometimes, their interests are not merely economic, but political. For this reason, <strong>Cyber Intelligence<\/strong> is a <strong>very relevant discipline for both public and private sectors.<\/strong><\/p>\n\n\n\n<p>Cyber Intelligence is <strong>based on data collection and information analysis<\/strong> but it goes much further than that. It uses <strong>threat information<\/strong> to identify patterns and trends. Based on threat intelligence, the company makes decisions and <strong>defines mitigation and prevention plans<\/strong>.<\/p>\n\n\n\n<p>With the data collected with Threat intelligence, companies can make more informed security decisions and be proactive to avoid potential cyber threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Types of Threat Intelligence<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-src=\"https:\/\/lh6.googleusercontent.com\/a7mvUlmTb7aKN8YsLsoRgxzk2TI9LLgKT1ueydEhaqmb4rgHieLRYBDExwruOnAcVTsWX-UeUKyGjzY97xOLUXdTqlu09K0LCUFsEbK89Zt-5mVBofUpyFRVwiohxYLvxxKm8boyRp3a5CUnXY1Ta8cny4qxBmVr5_s3-qgRAUkCZr1QnoxzD49oGg\" alt=\"Types Of Cyber Threat Intelligence\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><figcaption>Types Of Cyber Threat Intelligence<\/figcaption><\/figure>\n\n\n\n<p>There are essentially <strong>four types of cyber threat intelligence:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Strategic intelligence:<\/strong> This pertains to information regarding cyber security threats and details and is collected for high-level executives and management of an organisation. To collect strategic threat intelligence data, CTI analysts use ISAO reports, open source intelligence (OSINT) and external CTI providers, among others.<\/li><li><strong>Tactical intelligence:<\/strong> This provides information on the tactics, techniques and procedures (TTP) used by cybercriminals and is aimed at people who are in charge of computer resources and data protection<\/li><li><strong>Operational intelligence:<\/strong> This intelligence contains info about the nature and timing of future attacks and&nbsp; is collected from a variety of sources, such as social networks, antivirus logs, chats, etc.&nbsp;<\/li><li><strong>Technical intelligence:<\/strong> This info is based on the signs that an attack is starting and is often associated with operational threat intelligence<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">The importance of Cyber Threat Intelligence<\/h3>\n\n\n\n<p>So how does cyber threat intelligence help companies? As it turns out, in quite a few ways! For starters, threat intelligence allows IT security analysts to <strong>make better decisions which in turn helps strengthen a company\u2019s defenses.<\/strong><\/p>\n\n\n\n<p>It helps professionals in the security department better understand the threats they face and the ones responsible for them and it also helps them mitigate attacks that are in progress.<\/p>\n\n\n\n<p>Threat intelligence also allows professionals to prioritise incidents based on the impact they could cause and allows both cybersecurity and business stakeholders to feel more confident in their decisions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Responsibilities\">Responsibilities of a Cyber Intelligence Analyst<\/h2>\n\n\n\n<p>Cyber \u200b\u200bintelligence experts are responsible for <strong>collecting data and information <\/strong>from various sources in order to <strong>identify, monitor, measure and counter cyber threats.<\/strong><\/p>\n\n\n\n<p>These professionals do this by using <strong>open sources and private reports<\/strong>, such as technical reports and third-party data sources. Threat intelligence analysts then use the information collected to <strong>prepare intelligence reports for clients or companies.<\/strong><\/p>\n\n\n\n<p>In addition to collecting information about the context and related potential threats, a cyber intelligence expert is responsible for <strong>investigating specific threats<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-src=\"https:\/\/lh4.googleusercontent.com\/XQRSWBIPRghl1zUQos1dzrS2DOPSdgS0i_d_AWXm0rBHCJL86MeW37t_ef-4oQc8FAvBqXS_Cv3SlEcWQBWy_6-NDjewysDjNRy9pwWvMYktmlRPu12bPEcieHOEbDFoPAkn5W3Q_au87Gii5F4vlDgCyxvgSEjXmMjVSteV8IG8g5QfakZ9qTf9Xg\" alt=\" Responsibilities Of A Cyber Threat Intelligence Analyst \" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><figcaption> Responsibilities Of A Cyber Threat Intelligence Analyst <\/figcaption><\/figure>\n\n\n\n<p>Depending on the exact role of the expert and the clients they work for, the analyst will be in charge of defining, preparing and coordinating responses to threats, as well as monitoring the results.<\/p>\n\n\n\n<p>In more advanced cybersecurity and cyberintelligence teams, response actions are coordinated with the cybersecurity team and then executed.<\/p>\n\n\n\n<p><strong>What are cyber intelligence analysts responsible for?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Collect data and information about from different sources, both open and private<\/li><li>Investigate specific cyber threats<\/li><li>Scan networks for suspicious activity, anomalies, and potential threats<\/li><li>Assess potential threats<\/li><li>Assess the latest threats to customer networks and data, as well as tips and recommendations for countering said threats<\/li><li>Identify risks and TTP of attackers<\/li><li>Analysis of the company context and related risks<\/li><li>Prepare and explain cyber intelligence reports<\/li><li>Coordinate the definition and execution of response to threats<\/li><\/ul>\n\n\n\n<p style=\"background-color:#41c0eb;color:#ffffff;font-size:18px\" class=\"has-text-color has-background has-text-align-center\">&gt; <a href=\"https:\/\/www.freelancermap.com\/freelancers-directory.html?newQuery=%22cyber+intelligence%22&amp;continents=&amp;countries=&amp;states=&amp;city=&amp;radius=&amp;query=&amp;excludeDachRegion=0&amp;sort=1utm_source=blog&amp;utm_campaign=freelancers&amp;utm_medium=text&amp;utm_content=career-en\">Find expert Cyber Threat Intelligence Analysts<\/a> &lt;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Skills\">Skills of Threat Intelligence Analysts&nbsp;<\/h2>\n\n\n\n<p>Threat intelligence analysts have <strong>strong knowledge <\/strong>when it comes to different operating systems and concepts related to<strong> information security.<\/strong><\/p>\n\n\n\n<p>They also have an understanding of different <strong>programming languages, cybersecurity operations, security information and event management (SIEM) tools.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-src=\"https:\/\/lh3.googleusercontent.com\/4F1a-xPmKzX3_krFSSJiFm97fLvwCc64zu21q4GdNLbC4gPDYGTQ2rr0OFoMRc6T9xpvv6jOIvqvhwp4SDLSmRj_wo3weLud7vrxo3Ks4usOJ4fuRRqEE0JtZRxm3CNub6ohx1f09-74NgbRy7EB0Ao6IXQn6wqgFkLwZsBXTbqSYQrdcLT3Uu1c0g\" alt=\"Skills Of A Cyber Threat Intelligence Analyst\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><figcaption>Skills Of A Cyber Threat Intelligence Analyst<\/figcaption><\/figure>\n\n\n\n<p>These professionals know about the different <strong>Threat Intelligence tools available<\/strong> and know how to exploit them. These tools are as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Threat intelligence communities:<\/strong> These communities share collaborative research and actionable advice to prevent threats.<\/li><li><strong>SIEM tools:<\/strong> Security information and event management tools help IT security experts monitor the network in real-time. They can then analyse unusual behaviours.&nbsp;<\/li><li><strong>Malware disassemblers:<\/strong> These are tools that reverse engineer malware so that security engineers better understand how it works and can protect themselves to potential similar attacks<\/li><li><strong>Tools for network traffic analysis:<\/strong> These tools record network activity to gather information that allows an easier detection of an intrusion.<\/li><\/ul>\n\n\n\n<p>They have experience working with various <strong>threat intelligence frameworks such as the Diamond Model and Cyber Kill Chain<\/strong> and are able to understand and tackle complex technical and contextual issues.<\/p>\n\n\n\n<div class=\"wp-block-group has-background\" style=\"background-color:#5200ff\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"has-text-align-center has-text-color has-background has-link-color wp-elements-6d82840a84b8da60ba6e070480373475\" style=\"color:#ffffff;background-color:#5200ff;font-size:16px\"><br>Join our <strong>IT freelancer community<\/strong> today! Create your freelance profile in just <strong>2 minutes<\/strong>.&nbsp;&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"su-button-center\"><a href=\"https:\/\/www.freelancermap.com\/registration?ref=blog-com\" class=\"su-button su-button-style-default\" style=\"color:#5200FF;background-color:#3CFFD0;border-color:#30cca7;border-radius:20px\" target=\"_self\"><span style=\"color:#5200FF;padding:0px 20px;font-size:16px;line-height:32px;border-color:#77ffdf;border-radius:20px;text-shadow:none\"> <strong>Sign up for free!<\/strong><\/span><\/a><\/div><\/br><\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<p><strong>Cyber intelligence analysts<\/strong> possess strong analytical, strategic and tactical skills and have a curiosity to learn. They are also able to coordinate, communicate and work well with other teams.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Threat intelligence analyst skills:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Knowledge of cyber threat intelligence and cyber vulnerability management practices<\/li><li>Ability to analyse incident reports and follow up on incidents<\/li><li>Experience identifying and evaluating emerging and persistent threats, trends, TTPs, attribution, or threat hunting<\/li><li>Solid knowledge of incident management, problem management, and <a href=\"https:\/\/www.freelancermap.com\/blog\/what-does-change-manager-do\/\">change management<\/a> best practices<\/li><li>Experience analysing multiple disparate data sources like Passive DNS, Threat Sources, Vulnerabilities, Attack Surface, etc.<\/li><li>Experience with threat intelligence frameworks such as the Diamond Model and Cyber Kill Chain<\/li><li>Knowledge of network security and\/or operating systems<\/li><li>Open source research experience<\/li><li>Experience with SIEM tools and threat intelligence databases such as Datadog, Solarwinds, LogPoint, Graylog<\/li><li>Knowledge of industry standard frameworks like NIST, FISMA and FedRAMP<\/li><li>Valuable experience in forensic analysis of networks and\/or hosts<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Background\">Background and education in the Cyber Intelligence field<\/h2>\n\n\n\n<p>To work in the <strong>cyberintelligence sector<\/strong>, companies typically require threat intelligence analysts to have a<strong> bachelor&#8217;s degree in computer\/electronic engineering, computing, information technology, or an equivalent field of study.<\/strong><\/p>\n\n\n\n<p>Additionally, experience in security operations, cybersecurity, first response management, and IT risk management is important for a career in cyber intelligence.<\/p>\n\n\n\n<p><strong>Postgraduate studies and certifications<\/strong> in cyber intelligence (Security+, Cybersecurity Analyst \/ CySA+, Cyber \u200b\u200bThreat Intelligence \/ GCTI) are valued by organisations, as well as specialised certifications and continuing education.<\/p>\n\n\n\n<p>Here are some interesting training programs related to cyber intelligence:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.coursera.org\/learn\/ibm-cyber-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Cyber Threat Intelligence &#8211; IBM in Coursera<\/a><\/li><li><a href=\"https:\/\/niccs.cisa.gov\/education-training\/catalog\/mcafee-institute\/certified-cyber-intelligence-professional-ccip\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Certified Cyber Intelligence Professional (CCIP) &#8211; NICC and McAfee Institute<\/a><\/li><li><a href=\"https:\/\/www.sans.org\/cyber-security-courses\/cyber-threat-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">FOR578: Cyber Threat Intelligence<\/a><\/li><li><a href=\"https:\/\/www.eccouncil.org\/programs\/threat-intelligence-training\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Certified Threat Intelligence Analyst (C|TIA) &#8211; EC-Council<\/a><\/li><li><a href=\"https:\/\/www.udemy.com\/course\/cybersecurity-threat-intelligence-researcher\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Certified Cyber Threat Intelligence Analyst &#8211; Udemy<\/a><\/li><li><a href=\"https:\/\/www.giac.org\/certifications\/cyber-threat-intelligence-gcti\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Cyber Threat Intelligence (GCTI) &#8211; GIAC<\/a><\/li><\/ul>\n\n\n\n<p style=\"background-color:#41c0eb;color:#ffffff;font-size:18px\" class=\"has-text-color has-background has-text-align-center\">Looking for a job in Cyber Threat Intelligence? <br><a href=\"https:\/\/www.freelancermap.com\/it-projects.html?filter=&amp;excludeDachProjects=on&amp;newQuery=cyber+intelligence&amp;continents=&amp;countries=&amp;states=&amp;city=&amp;radius=&amp;query=&amp;excludeDachProjects=true&amp;sort=1&amp;sort=1&amp;utm_source=blog&amp;utm_medium=career-EN\">Find jobs here:<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Salary\">Salary<\/h2>\n\n\n\n<p>Entry-level analysts and beginners can earn approximately <strong>$61,000<\/strong> annually. The average <strong>salary for Cyber Threat Intelligence Analysts is $104,000<\/strong> whereas for senior analysts, the salary can go up to <strong>$165,500.<\/strong><\/p>\n\n\n\n<p>The <strong>salary range in Germany for Threat analysts is between \u20ac40,000 to \u20ac70,000<\/strong> whereas in the UK, it ranges from <strong>\u00a341,000 to \u00a375,000.<\/strong><\/p>\n\n\n\n<p>Keep in mind that threat intelligence experts can have very different salaries, depending on their responsibilities, experience, company size and the industry they are in.<\/p>\n\n\n\n<p><strong>How much do Cyber Intelligence Analysts make?<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">USA<\/td><td class=\"has-text-align-center\" data-align=\"center\">$61,000 &#8211; $165,500<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Germany<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u20ac40,000 &#8211; \u20ac70,000<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">UK<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u00a341,000 &#8211; \u00a375,000<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>How much do freelance cyber intelligence analysts make?<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">Average hourly rate of freelance cyber intelligence analysts<\/td><td> $109\/hour <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>On average, freelance threat intelligence analysts earn an average of <strong>$109\/hour<\/strong> (according to the freelancermap rate index in October 2022).&nbsp;<\/p>\n\n\n\n<p>Considering an 8-hour working day, the daily rate for freelance analysts is around <strong>$872\/day.<\/strong><\/p>\n\n\n\n<p>Most freelance analysts have an hourly rate between <strong>$91<\/strong> and<strong> $330<\/strong>.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Other interesting profiles<\/h2>\n\n\n\n\n<ul class=\"su-posts su-posts-list-loop \">\n\n\t\t\t\t\t\t\n\t\t\t\n\t\t\t<li id=\"su-post-24056\" class=\"su-post \">\n\t\t\t\t<a href=\"https:\/\/www.freelancermap.com\/blog\/what-does-hris-analyst-do\/\">What does an HRIS Analyst do?<\/a>\n\t\t\t<\/li>\n\n\t\t\t\t\t\n\t\t\t\n\t\t\t<li id=\"su-post-20762\" class=\"su-post \">\n\t\t\t\t<a href=\"https:\/\/www.freelancermap.com\/blog\/what-does-soc-analyst-do\/\">What does a SOC analyst do?<\/a>\n\t\t\t<\/li>\n\n\t\t\t\t\t\n\t\t\t\n\t\t\t<li id=\"su-post-27587\" class=\"su-post \">\n\t\t\t\t<a href=\"https:\/\/www.freelancermap.com\/blog\/what-does-data-architect-do\/\">What does a Data Architect do?<\/a>\n\t\t\t<\/li>\n\n\t\t\t\t\t\n\t\t\t\n\t\t\t<li id=\"su-post-40926\" class=\"su-post \">\n\t\t\t\t<a href=\"https:\/\/www.freelancermap.com\/blog\/what-does-ai-auditor-do\/\">What Does An AI Auditor Do?\u00a0<\/a>\n\t\t\t<\/li>\n\n\t\t\t\t\t\n\t\t\t\n\t\t\t<li id=\"su-post-5699\" class=\"su-post \">\n\t\t\t\t<a href=\"https:\/\/www.freelancermap.com\/blog\/what-does-data-warehouse-developer-do\/\">What does a Data Warehouse Developer do?<\/a>\n\t\t\t<\/li>\n\n\t\t\t\n<\/ul>\n\n\n\n\n<p> \u00bb\u00a0<a href=\"https:\/\/www.freelancermap.com\/blog\/freelance-job-profiles-it-roles\/#job-profiles-data-science-analysis\">More job profiles in Data Science &amp; Analysis<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Cyber Threat Intelligence Analyst detects, reports and proposes measures to mitigate cyber threats. The job of the Threat Intelligence Analyst is vital to today&#8217;s large companies, especially those that may be vulnerable to cybercriminals. What is Threat Intelligence? What does a Cyber Threat Intelligence Analyst do on a daily basis? Keep reading to find it out!<\/p>\n","protected":false},"author":1,"featured_media":34983,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"categories":[2993],"tags":[3419,3413],"class_list":["post-34985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-careers","tag-career-insights","tag-job-profiles"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Does A Cyber Threat Intelligence Analyst Do? | IT Security | Jobs<\/title>\n<meta name=\"description\" content=\"\u2713 Intro to Threat Intelligence \u2713 Responsibilities \u2713 Background \u2713 Skills \u2713 Salary \u2794 Explore the role of a Cyber Threat Intelligence Analyst\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Does A Cyber Threat Intelligence Analyst Do? | IT Security | Jobs\" \/>\n<meta property=\"og:description\" content=\"\u2713 Intro to Threat Intelligence \u2713 Responsibilities \u2713 Background \u2713 Skills \u2713 Salary \u2794 Explore the role of a Cyber Threat Intelligence Analyst\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/\" \/>\n<meta property=\"og:site_name\" content=\"Freelancer Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelancermapInternational\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/freelancermapInternational\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-21T06:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-25T10:50:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2022\/10\/Featured-Images-67.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Natalia Campana\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@freelancer_INT\" \/>\n<meta name=\"twitter:site\" content=\"@freelancer_INT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Natalia Campana\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/\"},\"author\":{\"name\":\"Natalia Campana\",\"@id\":\"https:\/\/www.freelancermap.com\/blog\/#\/schema\/person\/1c0c07efea89560f1cf644d58f321eb7\"},\"headline\":\"What does a Cyber Threat Intelligence Analyst do?\",\"datePublished\":\"2022-10-21T06:00:00+00:00\",\"dateModified\":\"2022-10-25T10:50:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/\"},\"wordCount\":1376,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.freelancermap.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2022\/10\/Featured-Images-67.png\",\"keywords\":[\"Career insights\",\"Job Profiles\"],\"articleSection\":[\"Careers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/\",\"url\":\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/\",\"name\":\"What Does A Cyber Threat Intelligence Analyst Do? | IT Security | Jobs\",\"isPartOf\":{\"@id\":\"https:\/\/www.freelancermap.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2022\/10\/Featured-Images-67.png\",\"datePublished\":\"2022-10-21T06:00:00+00:00\",\"dateModified\":\"2022-10-25T10:50:47+00:00\",\"description\":\"\u2713 Intro to Threat Intelligence \u2713 Responsibilities \u2713 Background \u2713 Skills \u2713 Salary \u2794 Explore the role of a Cyber Threat Intelligence Analyst\",\"breadcrumb\":{\"@id\":\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#primaryimage\",\"url\":\"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2022\/10\/Featured-Images-67.png\",\"contentUrl\":\"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2022\/10\/Featured-Images-67.png\",\"width\":1200,\"height\":628,\"caption\":\"the role of a cyber threat intelligence analyst\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.freelancermap.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What does a Cyber Threat Intelligence Analyst do?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.freelancermap.com\/blog\/#website\",\"url\":\"https:\/\/www.freelancermap.com\/blog\/\",\"name\":\"Freelancer Blog\",\"description\":\"Tips &amp; Practical Advice for Freelancers and IT professionals\",\"publisher\":{\"@id\":\"https:\/\/www.freelancermap.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.freelancermap.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.freelancermap.com\/blog\/#organization\",\"name\":\"freelancermap.com\",\"url\":\"https:\/\/www.freelancermap.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.freelancermap.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2025\/02\/freelancermap-black-logo@4x.png\",\"contentUrl\":\"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2025\/02\/freelancermap-black-logo@4x.png\",\"width\":1044,\"height\":145,\"caption\":\"freelancermap.com\"},\"image\":{\"@id\":\"https:\/\/www.freelancermap.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/freelancermapInternational\/\",\"https:\/\/x.com\/freelancer_INT\",\"https:\/\/www.linkedin.com\/company\/freelancermap-gmbh\/\",\"https:\/\/www.instagram.com\/freelancermap_int\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.freelancermap.com\/blog\/#\/schema\/person\/1c0c07efea89560f1cf644d58f321eb7\",\"name\":\"Natalia Campana\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.freelancermap.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/548d9330cdf84e13b1e5ce0bfd750c06?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/548d9330cdf84e13b1e5ce0bfd750c06?s=96&d=mm&r=g\",\"caption\":\"Natalia Campana\"},\"description\":\"Natalia is part of the international team at freelancermap. She loves the digital world, social media and meeting different cultures. Before she moved to Germany and joined the freelancermap team she worked in the US, UK and her home country Spain. Now she focuses on helping freelancers and IT professionals to find jobs and clients worldwide at www.freelancermap.com\",\"sameAs\":[\"https:\/\/www.freelancermap.com\/\",\"https:\/\/www.facebook.com\/freelancermapInternational\/\",\"https:\/\/www.linkedin.com\/in\/natalia-campana\/\",\"https:\/\/x.com\/freelancer_INT\"],\"url\":\"https:\/\/www.freelancermap.com\/blog\/author\/natalia-campana\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Does A Cyber Threat Intelligence Analyst Do? | IT Security | Jobs","description":"\u2713 Intro to Threat Intelligence \u2713 Responsibilities \u2713 Background \u2713 Skills \u2713 Salary \u2794 Explore the role of a Cyber Threat Intelligence Analyst","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/","og_locale":"en_US","og_type":"article","og_title":"What Does A Cyber Threat Intelligence Analyst Do? | IT Security | Jobs","og_description":"\u2713 Intro to Threat Intelligence \u2713 Responsibilities \u2713 Background \u2713 Skills \u2713 Salary \u2794 Explore the role of a Cyber Threat Intelligence Analyst","og_url":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/","og_site_name":"Freelancer Blog","article_publisher":"https:\/\/www.facebook.com\/freelancermapInternational\/","article_author":"https:\/\/www.facebook.com\/freelancermapInternational\/","article_published_time":"2022-10-21T06:00:00+00:00","article_modified_time":"2022-10-25T10:50:47+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2022\/10\/Featured-Images-67.png","type":"image\/png"}],"author":"Natalia Campana","twitter_card":"summary_large_image","twitter_creator":"@freelancer_INT","twitter_site":"@freelancer_INT","twitter_misc":{"Written by":"Natalia Campana","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#article","isPartOf":{"@id":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/"},"author":{"name":"Natalia Campana","@id":"https:\/\/www.freelancermap.com\/blog\/#\/schema\/person\/1c0c07efea89560f1cf644d58f321eb7"},"headline":"What does a Cyber Threat Intelligence Analyst do?","datePublished":"2022-10-21T06:00:00+00:00","dateModified":"2022-10-25T10:50:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/"},"wordCount":1376,"commentCount":0,"publisher":{"@id":"https:\/\/www.freelancermap.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#primaryimage"},"thumbnailUrl":"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2022\/10\/Featured-Images-67.png","keywords":["Career insights","Job Profiles"],"articleSection":["Careers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/","url":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/","name":"What Does A Cyber Threat Intelligence Analyst Do? | IT Security | Jobs","isPartOf":{"@id":"https:\/\/www.freelancermap.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#primaryimage"},"image":{"@id":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#primaryimage"},"thumbnailUrl":"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2022\/10\/Featured-Images-67.png","datePublished":"2022-10-21T06:00:00+00:00","dateModified":"2022-10-25T10:50:47+00:00","description":"\u2713 Intro to Threat Intelligence \u2713 Responsibilities \u2713 Background \u2713 Skills \u2713 Salary \u2794 Explore the role of a Cyber Threat Intelligence Analyst","breadcrumb":{"@id":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#primaryimage","url":"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2022\/10\/Featured-Images-67.png","contentUrl":"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2022\/10\/Featured-Images-67.png","width":1200,"height":628,"caption":"the role of a cyber threat intelligence analyst"},{"@type":"BreadcrumbList","@id":"https:\/\/www.freelancermap.com\/blog\/what-does-cyber-threat-intelligence-analyst-do\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.freelancermap.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What does a Cyber Threat Intelligence Analyst do?"}]},{"@type":"WebSite","@id":"https:\/\/www.freelancermap.com\/blog\/#website","url":"https:\/\/www.freelancermap.com\/blog\/","name":"Freelancer Blog","description":"Tips &amp; Practical Advice for Freelancers and IT professionals","publisher":{"@id":"https:\/\/www.freelancermap.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.freelancermap.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.freelancermap.com\/blog\/#organization","name":"freelancermap.com","url":"https:\/\/www.freelancermap.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.freelancermap.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2025\/02\/freelancermap-black-logo@4x.png","contentUrl":"https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2025\/02\/freelancermap-black-logo@4x.png","width":1044,"height":145,"caption":"freelancermap.com"},"image":{"@id":"https:\/\/www.freelancermap.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelancermapInternational\/","https:\/\/x.com\/freelancer_INT","https:\/\/www.linkedin.com\/company\/freelancermap-gmbh\/","https:\/\/www.instagram.com\/freelancermap_int\/"]},{"@type":"Person","@id":"https:\/\/www.freelancermap.com\/blog\/#\/schema\/person\/1c0c07efea89560f1cf644d58f321eb7","name":"Natalia Campana","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.freelancermap.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/548d9330cdf84e13b1e5ce0bfd750c06?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/548d9330cdf84e13b1e5ce0bfd750c06?s=96&d=mm&r=g","caption":"Natalia Campana"},"description":"Natalia is part of the international team at freelancermap. She loves the digital world, social media and meeting different cultures. Before she moved to Germany and joined the freelancermap team she worked in the US, UK and her home country Spain. Now she focuses on helping freelancers and IT professionals to find jobs and clients worldwide at www.freelancermap.com","sameAs":["https:\/\/www.freelancermap.com\/","https:\/\/www.facebook.com\/freelancermapInternational\/","https:\/\/www.linkedin.com\/in\/natalia-campana\/","https:\/\/x.com\/freelancer_INT"],"url":"https:\/\/www.freelancermap.com\/blog\/author\/natalia-campana\/"}]}},"taxonomy_info":{"category":[{"value":2993,"label":"Careers"}],"post_tag":[{"value":3419,"label":"Career insights"},{"value":3413,"label":"Job Profiles"}]},"featured_image_src_large":["https:\/\/www.freelancermap.com\/blog\/wp-content\/uploads\/2022\/10\/Featured-Images-67-1024x536.png",720,377,true],"author_info":{"display_name":"Natalia Campana","author_link":"https:\/\/www.freelancermap.com\/blog\/author\/natalia-campana\/"},"comment_info":0,"category_info":[{"term_id":2993,"name":"Careers","slug":"careers","term_group":0,"term_taxonomy_id":2993,"taxonomy":"category","description":"<span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;The economy is changing and new job roles are being created thanks to the digitalization. We introduce you to the most demanded positions in the IT field and offer technical guides and other career guiandance.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:4865,&quot;3&quot;:{&quot;1&quot;:0},&quot;11&quot;:4,&quot;12&quot;:0,&quot;15&quot;:&quot;Roboto&quot;}\">The economy is changing and new job roles are being created thanks to the digitalization. We introduce you to the most demanded positions in the IT field and offer technical guides and other career guidance.<\/span>","parent":0,"count":278,"filter":"raw","cat_ID":2993,"category_count":278,"category_description":"<span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;The economy is changing and new job roles are being created thanks to the digitalization. We introduce you to the most demanded positions in the IT field and offer technical guides and other career guiandance.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:4865,&quot;3&quot;:{&quot;1&quot;:0},&quot;11&quot;:4,&quot;12&quot;:0,&quot;15&quot;:&quot;Roboto&quot;}\">The economy is changing and new job roles are being created thanks to the digitalization. We introduce you to the most demanded positions in the IT field and offer technical guides and other career guidance.<\/span>","cat_name":"Careers","category_nicename":"careers","category_parent":0}],"tag_info":[{"term_id":3419,"name":"Career insights","slug":"career-insights","term_group":0,"term_taxonomy_id":3419,"taxonomy":"post_tag","description":"","parent":0,"count":264,"filter":"raw"},{"term_id":3413,"name":"Job Profiles","slug":"job-profiles","term_group":0,"term_taxonomy_id":3413,"taxonomy":"post_tag","description":"","parent":0,"count":266,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/www.freelancermap.com\/blog\/wp-json\/wp\/v2\/posts\/34985"}],"collection":[{"href":"https:\/\/www.freelancermap.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.freelancermap.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.freelancermap.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.freelancermap.com\/blog\/wp-json\/wp\/v2\/comments?post=34985"}],"version-history":[{"count":3,"href":"https:\/\/www.freelancermap.com\/blog\/wp-json\/wp\/v2\/posts\/34985\/revisions"}],"predecessor-version":[{"id":35271,"href":"https:\/\/www.freelancermap.com\/blog\/wp-json\/wp\/v2\/posts\/34985\/revisions\/35271"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.freelancermap.com\/blog\/wp-json\/wp\/v2\/media\/34983"}],"wp:attachment":[{"href":"https:\/\/www.freelancermap.com\/blog\/wp-json\/wp\/v2\/media?parent=34985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.freelancermap.com\/blog\/wp-json\/wp\/v2\/categories?post=34985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.freelancermap.com\/blog\/wp-json\/wp\/v2\/tags?post=34985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}