13 Lead Cybersecurity Threat Intelligence Analyst jobs in whatjobs
Lead Cybersecurity Threat Intelligence Analyst
Posted 20 days ago
Job Viewed
Job Description
Lead Cybersecurity Threat Intelligence Analyst
Posted 20 days ago
Job Viewed
Job Description
Key responsibilities include:
- Leading the collection, analysis, and dissemination of threat intelligence from various sources, including open-source intelligence (OSINT), dark web monitoring, and commercial feeds.
- Developing and maintaining strategic and tactical threat intelligence reports, adversary profiles, and tactical, operational, and strategic intelligence summaries.
- Identifying emerging threats, attack vectors, and adversary TTPs (Tactics, Techniques, and Procedures) relevant to our client's industry and infrastructure.
- Collaborating with incident response, security operations, and vulnerability management teams to provide timely intelligence that aids in detection, prevention, and remediation.
- Developing and implementing intelligence requirements and collection plans in alignment with organizational risk tolerance and business objectives.
- Utilizing and optimizing threat intelligence platforms (TIPs) and other security tools to automate data collection and analysis.
- Conducting proactive threat hunting exercises based on intelligence gathered.
- Mentoring and guiding junior threat intelligence analysts, fostering a culture of continuous learning and improvement.
- Communicating complex technical information clearly and concisely to both technical and non-technical stakeholders.
- Staying current with the evolving threat landscape, geopolitical events, and advancements in cybersecurity.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Master's degree preferred.
- 7+ years of experience in cybersecurity, with at least 3-5 years focused specifically on threat intelligence analysis.
- Proven experience in collecting, analyzing, and disseminating actionable threat intelligence.
- In-depth knowledge of cyber threat actor groups, their motivations, TTPs, and tooling.
- Familiarity with various intelligence analysis frameworks (e.g., Diamond Model, Cyber Kill Chain).
- Experience with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
- Strong understanding of network protocols, operating systems, and common exploitation techniques.
- Excellent written and verbal communication skills, with the ability to present findings effectively.
- Demonstrated leadership and mentoring capabilities.
- Relevant certifications such as GCTI, CTIA, or CISSP are a plus.
Lead Cybersecurity Threat Intelligence Analyst
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Lead the collection, analysis, and dissemination of global cybersecurity threat intelligence.
- Develop and refine methodologies for identifying, tracking, and assessing threat actors and their TTPs.
- Manage and mentor a team of threat intelligence analysts, providing guidance and fostering professional development.
- Conduct proactive threat hunting exercises to identify and neutralize potential threats before they impact the organization.
- Develop and maintain comprehensive threat intelligence reports, briefings, and dashboards.
- Integrate threat intelligence feeds and indicators of compromise (IOCs) into SIEM, SOAR, and other security platforms.
- Collaborate with incident response, security operations, and IT teams to provide timely and actionable intelligence.
- Research and analyze emerging threats, vulnerabilities, and attack vectors relevant to the organization's industry and technology stack.
- Build and maintain relationships with external threat intelligence communities, law enforcement, and information sharing groups.
- Develop and deliver training on threat intelligence awareness and best practices.
- Contribute to the development and improvement of the organization's overall cybersecurity strategy.
- Stay current with the latest trends in cybersecurity, malware, and threat actor methodologies.
- Bachelor's or Master's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity, with at least 4 years specifically focused on threat intelligence analysis.
- Demonstrated experience leading or managing a team of security analysts.
- In-depth knowledge of threat actor TTPs, malware analysis, and cyber-espionage techniques.
- Proficiency with threat intelligence platforms, SIEM solutions, and data analysis tools.
- Experience with scripting languages (e.g., Python, PowerShell) for automation and data analysis.
- Strong understanding of network security principles, cryptography, and common vulnerabilities.
- Exceptional analytical, problem-solving, and critical thinking skills.
- Excellent written and verbal communication skills, with the ability to present complex technical information clearly.
- Proven ability to work independently and effectively in a fully remote, global team environment.
- Relevant certifications such as GCTI, CASP+, CISSP, or CCSP are highly desirable.
Lead Cybersecurity Threat Intelligence Analyst
Posted 12 days ago
Job Viewed
Job Description
Responsibilities:
- Lead the collection, processing, and analysis of threat intelligence from diverse sources, including open-source intelligence (OSINT), dark web monitoring, technical feeds, and human intelligence.
- Develop and maintain a comprehensive understanding of the current and emerging threat landscape, including threat actor tactics, techniques, and procedures (TTPs).
- Produce timely and actionable threat intelligence reports, briefings, and alerts tailored to various stakeholders, including technical teams and executive leadership.
- Identify and track threat actors targeting the organization or its industry, assessing their motivations, capabilities, and potential impact.
- Develop and refine threat hunting methodologies based on intelligence gathered, working closely with incident response and security operations teams.
- Build and manage relationships with external threat intelligence communities, government agencies, and information-sharing groups.
- Develop and implement threat modeling frameworks and risk assessments to proactively identify vulnerabilities and potential attack vectors.
- Utilize threat intelligence platforms (TIPs), SIEM tools, and other security technologies to automate analysis and enhance detection capabilities.
- Provide strategic guidance on threat mitigation and defense strategies based on intelligence insights.
- Mentor and guide junior threat intelligence analysts, fostering a culture of continuous learning and improvement.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 6 years of experience in cybersecurity, with at least 3 years focused specifically on threat intelligence analysis.
- Proven expertise in OSINT techniques, malware analysis, and understanding of various attack methodologies.
- Strong knowledge of threat actor groups, their TTPs, and common exploitation vectors.
- Experience with threat intelligence platforms (TIPs), SIEM solutions, and security orchestration, automation, and response (SOAR) tools.
- Excellent analytical, critical thinking, and research skills, with the ability to synthesize complex information into actionable intelligence.
- Superior written and verbal communication skills, capable of producing clear, concise reports and delivering effective briefings.
- Experience leading small teams or projects is highly desirable.
- Relevant certifications such as GCTI, CTIA, OSCP, CISSP are a plus.
- Ability to work independently and collaboratively in a 100% remote environment, demonstrating strong self-discipline and time management.
Lead Cybersecurity Threat Intelligence Analyst
Posted 10 days ago
Job Viewed
Job Description
Key Responsibilities:
- Lead and mentor a team of threat intelligence analysts, fostering a collaborative and high-performance culture.
- Oversee the collection, analysis, and interpretation of threat data from various sources, including open-source intelligence (OSINT), dark web monitoring, and proprietary feeds.
- Develop and refine methodologies for identifying emerging threats, attacker TTPs (Tactics, Techniques, and Procedures), and campaign attribution.
- Produce timely and insightful threat intelligence reports, briefings, and alerts for executive leadership, security operations, and client stakeholders.
- Translate complex technical findings into clear, actionable recommendations for threat mitigation and incident response.
- Develop and maintain strategic threat profiles of relevant threat actors and their motivations.
- Collaborate closely with security operations, incident response, and vulnerability management teams to ensure intelligence is integrated into defensive strategies.
- Research and evaluate new threat intelligence tools and technologies to enhance our analytical capabilities.
- Contribute to the development of predictive threat models and early warning systems.
- Represent the company in threat intelligence communities and forums, sharing insights and building external relationships.
- Manage the threat intelligence platform and ensure data integrity and accuracy.
- Develop and deliver training on threat intelligence concepts and best practices to internal teams.
Qualifications:
- Bachelor's or Master's degree in Computer Science, Cybersecurity, Information Security, or a related field.
- Minimum of 8 years of progressive experience in cybersecurity, with at least 4 years focused specifically on threat intelligence analysis.
- Proven experience in leading and managing technical teams.
- Deep understanding of threat actor methodologies, malware analysis, and reverse engineering concepts.
- Expertise in utilizing OSINT tools, threat intelligence platforms (TIPs), SIEM solutions, and data visualization tools.
- Strong knowledge of network security, endpoint security, and cloud security principles.
- Excellent analytical, critical thinking, and problem-solving skills with a keen attention to detail.
- Exceptional written and verbal communication skills, with the ability to present complex information clearly and concisely.
- Demonstrated ability to work independently and collaboratively in a fast-paced, remote environment.
- Relevant certifications such as GIAC, CISSP, or similar are highly desirable.
Lead Cybersecurity Threat Intelligence Analyst
Posted 10 days ago
Job Viewed
Job Description
Lead Cybersecurity Threat Intelligence Analyst
Posted 9 days ago
Job Viewed
Job Description
Location: Mombasa, Mombasa, KE
Be The First To Know
About the latest Lead cybersecurity threat intelligence analyst Jobs in Kenya !
Lead Cybersecurity Threat Intelligence Analyst
Posted 9 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze global threat intelligence sources, including open-source intelligence (OSINT), dark web forums, security blogs, and vendor reports.
- Identify and track Advanced Persistent Threats (APTs), cybercriminal groups, and nation-state actors.
- Develop and maintain comprehensive profiles of threat actors, including their tactics, techniques, and procedures (TTPs).
- Produce high-quality threat intelligence reports, alerts, and briefings for technical and executive audiences.
- Collaborate with incident response, security operations center (SOC), and vulnerability management teams to integrate threat intelligence into defensive strategies.
- Develop and implement intelligence collection plans and methodologies.
- Utilize and optimize threat intelligence platforms and tools.
- Provide strategic guidance on threat trends and their potential impact on the organization and its clients.
- Conduct in-depth research on specific threats, malware, and exploitation techniques.
- Contribute to the development of security metrics and Key Performance Indicators (KPIs) related to threat intelligence.
- Mentor and guide junior threat intelligence analysts.
- Stay current with the latest cybersecurity trends, technologies, and attack vectors.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Master's degree preferred.
- Minimum of 8 years of experience in cybersecurity, with at least 5 years focused specifically on threat intelligence analysis.
- Demonstrated expertise in analyzing various types of cyber threats, including malware, phishing, DDoS attacks, and advanced persistent threats.
- Proficiency with threat intelligence platforms (TIPs), SIEM tools, and security analytics.
- Strong understanding of network protocols, operating systems, and common security vulnerabilities.
- Experience with scripting languages (e.g., Python, PowerShell) for automation and data analysis.
- Excellent analytical, critical thinking, and problem-solving skills.
- Exceptional written and verbal communication skills, with the ability to present complex information clearly and concisely.
- Proven ability to work independently and collaboratively in a distributed, remote team environment.
- Relevant certifications such as CISSP, GIAC, or other cybersecurity credentials are a plus.
- A deep understanding of geopolitical factors influencing cyber threats is highly valued.
Lead Cybersecurity Threat Intelligence Analyst
Posted 3 days ago
Job Viewed
Job Description
Lead Cybersecurity Threat Intelligence Analyst
Posted 5 days ago
Job Viewed
Job Description
Key responsibilities include managing and mentoring a team of threat intelligence analysts, overseeing the operationalization of intelligence feeds, and developing advanced analytical techniques. You will conduct in-depth research on threat actors, their TTPs (Tactics, Techniques, and Procedures), and motivations. Building and maintaining relationships with external threat intelligence partners and communities will also be a critical part of your role. The ideal candidate will have extensive experience in cybersecurity, with a specialization in threat intelligence, intelligence analysis, or reverse engineering. A deep understanding of geopolitical factors influencing cyber threats, malware analysis, network security, and various attack vectors is essential. Experience with SIEM tools, SOAR platforms, and threat intelligence platforms (TIPs) is highly desirable. You should possess excellent analytical, communication, and leadership skills, with the ability to present complex findings clearly and concisely. A relevant Bachelor's or Master's degree in Cybersecurity, Computer Science, or a related field, or equivalent demonstrable experience, is required. This is a significant opportunity to make a substantial impact on an organization's security posture in a remote-first environment. The role requires a proactive and curious mindset, dedication to staying ahead of cyber adversaries, and a passion for building robust security intelligence capabilities. While the role is remote, the focus is on supporting the operational needs associated with Mombasa, Mombasa, KE .