27 Senior Cybersecurity Threat Intelligence Analyst jobs in whatjobs
Senior Cybersecurity Threat Intelligence Analyst
Posted 21 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze threat intelligence feeds, open-source intelligence (OSINT), and other relevant data sources to identify emerging threats and attack vectors.
- Develop and maintain profiles of threat actors, their motivations, and their typical TTPs.
- Conduct in-depth research into malware, exploits, and emerging cyber threats.
- Produce timely and actionable threat intelligence reports for various stakeholders, including security operations teams, incident response teams, and executive leadership.
- Develop and refine methodologies for threat hunting and proactive detection of advanced persistent threats (APTs).
- Collaborate with internal security teams to integrate threat intelligence into security controls, detection mechanisms, and incident response playbooks.
- Provide expert guidance on threat landscape trends and their implications for the organization.
- Contribute to the development and improvement of threat intelligence platforms and tools.
- Mentor junior analysts and contribute to the overall growth of the threat intelligence program.
- Stay current with the latest cybersecurity threats, vulnerabilities, and defensive strategies.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity, with at least 4 years focused on threat intelligence analysis.
- Deep understanding of threat actor methodologies, including the Cyber Kill Chain and MITRE ATT&CK framework.
- Proficiency in utilizing various threat intelligence platforms, SIEM tools, and data analysis techniques.
- Experience with OSINT gathering and analysis techniques.
- Strong understanding of network protocols, operating systems, and common cybersecurity vulnerabilities.
- Excellent analytical, critical thinking, and problem-solving skills.
- Exceptional written and verbal communication skills, with the ability to produce clear and concise intelligence reports.
- Proven ability to work independently and collaboratively in a 100% remote work environment.
- Relevant cybersecurity certifications (e.g., CISSP, GCTI, CEH) are highly desirable.
Senior Cybersecurity Threat Intelligence Analyst
Posted 21 days ago
Job Viewed
Job Description
Responsibilities:
- Collect, analyze, and interpret threat intelligence data from diverse sources.
- Develop and disseminate timely threat intelligence reports, advisories, and alerts.
- Identify and track advanced persistent threats (APTs) and other malicious actors.
- Conduct proactive threat hunting to uncover hidden threats and vulnerabilities.
- Develop and refine threat detection and prevention rules and signatures.
- Collaborate with incident response and security operations teams.
- Support the development of security policies and procedures based on threat intelligence.
- Maintain knowledge of the latest cybersecurity threats, trends, and technologies.
- Automate threat intelligence collection and analysis processes where possible.
- Provide expert consultation on cybersecurity threats to stakeholders.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence or security analysis.
- Proven experience in collecting and analyzing threat intelligence data.
- Strong understanding of adversary TTPs, attack vectors, and threat landscapes.
- Proficiency with SIEM tools, threat intelligence platforms, and security analysis tools.
- Experience with scripting (e.g., Python) for automation is highly desirable.
- Excellent analytical, critical thinking, and problem-solving skills.
- Strong written and verbal communication skills for clear reporting and collaboration in a remote setting.
- Relevant cybersecurity certifications (e.g., GCTI, CTIA, CISSP) are a plus.
Senior Cybersecurity Threat Intelligence Analyst
Posted 21 days ago
Job Viewed
Job Description
Senior Cybersecurity Threat Intelligence Analyst
Posted 21 days ago
Job Viewed
Job Description
Senior Cybersecurity Threat Intelligence Analyst
Posted 21 days ago
Job Viewed
Job Description
Responsibilities:
- Collect, analyze, and synthesize threat intelligence from various sources, including open-source intelligence (OSINT), commercial feeds, and internal security telemetry.
- Develop and maintain a deep understanding of current and emerging cyber threats, threat actors, and their motivations.
- Produce timely and actionable threat intelligence reports for various audiences, including technical teams and executive leadership.
- Identify and track malicious campaigns, malware families, and vulnerabilities relevant to the organization's industry and infrastructure.
- Conduct in-depth analysis of malware samples, network traffic, and forensic data to understand attack methodologies.
- Develop and implement threat hunting hypotheses based on intelligence gathered.
- Collaborate with security operations (SecOps) and incident response (IR) teams to provide context and support during investigations.
- Build and maintain relationships with external threat intelligence communities and information-sharing groups.
- Develop and refine processes for the collection, analysis, and dissemination of threat intelligence.
- Contribute to the development of security controls and strategies based on threat intelligence findings.
- Mentor junior analysts and share expertise within the cybersecurity team.
- Ensure threat intelligence activities are aligned with organizational risk management objectives.
- Bachelor's or Master's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 6 years of experience in cybersecurity, with a strong specialization in threat intelligence analysis.
- Demonstrated expertise in analyzing malware, network traffic, and host-based artifacts.
- Proficiency with threat intelligence platforms (TIPs) and security information and event management (SIEM) tools.
- Strong understanding of various attack vectors, TTPs, and the cyber kill chain.
- Experience with scripting languages (e.g., Python, PowerShell) for automation of analysis tasks.
- Familiarity with incident response frameworks and procedures.
- Excellent analytical, research, and report-writing skills.
- Ability to work independently and collaboratively in a remote environment, managing critical information flow.
- Relevant certifications such as GIAC Certified Incident Handler (GCIH), Certified Threat Intelligence Analyst (CTIA), or equivalent.
Senior Cybersecurity Threat Intelligence Analyst
Posted 19 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze global threat intelligence feeds, news, and open-source information to identify emerging cyber threats relevant to the organization.
- Conduct in-depth research on threat actors, malware, vulnerabilities, and attack trends.
- Develop and maintain threat intelligence reports, indicators of compromise (IOCs), and tactical intelligence products.
- Provide actionable intelligence to security operations, incident response, and vulnerability management teams.
- Correlate and analyze disparate data sources to identify patterns and trends in malicious activity.
- Develop and refine threat models and hypotheses based on intelligence gathered.
- Support incident response activities by providing timely and relevant threat context.
- Contribute to the development and improvement of security tools and technologies used for threat intelligence gathering and analysis.
- Mentor junior analysts and contribute to the team's overall knowledge base.
- Stay abreast of the latest advancements in cybersecurity threats, tools, and techniques.
- Communicate complex technical findings effectively to both technical and non-technical stakeholders.
- Participate in threat hunting initiatives based on intelligence insights.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Master's degree is a plus.
- Minimum of 6 years of experience in cybersecurity, with a specialization in threat intelligence, security operations, or incident response.
- Demonstrated experience in analyzing malware, understanding attack vectors, and identifying threat actor TTPs.
- Proficiency with threat intelligence platforms, SIEM tools, and various security analytics tools.
- Strong understanding of networking protocols, operating systems, and common vulnerabilities.
- Excellent research, analytical, and critical thinking skills.
- Superior written and verbal communication skills, with the ability to produce high-quality intelligence reports.
- Ability to work independently and collaboratively in a fast-paced, remote environment.
- Experience with scripting languages (e.g., Python) for automating intelligence tasks is highly desirable.
- Relevant certifications such as GIAC GCTI, CEH, CISSP are a plus.
Senior Cybersecurity Threat Intelligence Analyst
Posted 21 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze open-source intelligence (OSINT), dark web, and other threat intelligence sources to identify potential threats.
- Develop and maintain strategic, operational, and tactical threat intelligence reports for various stakeholders, including executive leadership, security operations, and incident response teams.
- Research and analyze threat actor profiles, motivations, capabilities, and TTPs.
- Provide timely and relevant intelligence to support incident response efforts, threat hunting, and proactive defense initiatives.
- Develop and manage threat intelligence feeds and platforms, ensuring data accuracy and relevance.
- Collaborate with global security teams to share intelligence and coordinate defensive actions.
- Build and maintain relationships with external threat intelligence communities and vendors.
- Develop and refine threat models and hypotheses based on intelligence analysis.
- Automate intelligence gathering, processing, and analysis where possible.
- Conduct deep-dive investigations into specific threat campaigns or actors.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field, or equivalent practical experience.
- Minimum of 5 years of experience in cybersecurity, with at least 3 years specifically in threat intelligence analysis.
- In-depth knowledge of various threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
- Proficiency in using threat intelligence platforms, SIEM tools, and data analysis tools.
- Strong understanding of malware analysis, network forensics, and incident response principles.
- Excellent analytical, critical thinking, and problem-solving skills.
- Superior written and verbal communication skills, with the ability to clearly articulate complex technical information.
- Demonstrated ability to work independently and effectively in a remote, fast-paced environment.
- Relevant certifications such as GIAC Certified Threat Intelligence (GCTI), CISSP, or CEH are highly desirable.
- Experience with scripting languages (e.g., Python) for automation is a plus.
Be The First To Know
About the latest Senior cybersecurity threat intelligence analyst Jobs in Kenya !
Senior Cybersecurity Threat Intelligence Analyst
Posted 13 days ago
Job Viewed
Job Description
Key Responsibilities:
- Collect, analyze, and correlate threat intelligence from diverse sources, including open-source intelligence (OSINT), dark web forums, and proprietary feeds.
- Identify and track emerging cyber threats, threat actors, tactics, techniques, and procedures (TTPs).
- Develop comprehensive threat intelligence reports, briefings, and alerts for various audiences, including technical teams and executive leadership.
- Conduct in-depth research on targeted attacks, malware campaigns, and vulnerabilities relevant to the organization's industry and infrastructure.
- Develop and maintain threat models, including adversary profiles and attack vectors.
- Collaborate with incident response, security operations, and vulnerability management teams to operationalize threat intelligence.
- Provide early warnings and actionable recommendations to mitigate risks and enhance defensive strategies.
- Utilize threat intelligence platforms, SIEM tools, and other security technologies to support analysis and dissemination.
- Contribute to the development and refinement of threat hunting methodologies based on intelligence insights.
- Stay current with the latest cybersecurity trends, attack methodologies, and threat actor methodologies.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Master's degree preferred.
- Minimum of 7 years of experience in cybersecurity, with a specialization in threat intelligence analysis or cyber threat research.
- Demonstrated experience in analyzing malware, network traffic, and forensic artifacts.
- Proficiency in utilizing threat intelligence platforms, OSINT tools, and security information and event management (SIEM) systems.
- Strong understanding of attack frameworks (e.g., MITRE ATT&CK), threat actor TTPs, and geopolitical cyber threats.
- Excellent analytical, critical thinking, and research skills, with the ability to synthesize complex information.
- Superb written and verbal communication skills, with the ability to present complex technical information clearly and concisely.
- Experience with scripting languages (e.g., Python) for automation of analysis tasks is a plus.
- Relevant certifications such as GCTI, CISSP, or OSCP are highly desirable.
- Proven ability to work independently, manage time effectively, and collaborate seamlessly in a distributed, remote team environment.
Senior Cybersecurity Threat Intelligence Analyst
Posted 13 days ago
Job Viewed
Job Description
Key Responsibilities:
- Conduct in-depth research and analysis of global cyber threat landscapes, identifying emerging threats, attack vectors, and threat actor methodologies relevant to our client's business operations.
- Develop and maintain strategic and tactical threat intelligence reports, briefings, and alerts for various audiences, including executive leadership, security operations teams, and incident response teams.
- Monitor and analyze threat intelligence feeds, open-source intelligence (OSINT), dark web activity, and other relevant data sources to detect potential security incidents and indicators of compromise (IOCs).
- Build and manage relationships with external intelligence sharing communities, government agencies, and industry peers to enhance intelligence collection and validation.
- Develop and refine threat hunting methodologies and proactively search for advanced persistent threats (APTs) and other sophisticated malicious activities within the client's network.
- Contribute to the development and improvement of the organization's threat intelligence platform, including tooling, processes, and data management.
- Provide expert consultation and support to incident response, security operations, and IT teams during security incidents.
- Develop and deliver training on threat intelligence best practices and emerging threats to internal security teams.
- Stay abreast of the latest cybersecurity trends, technologies, and geopolitical events that may impact the threat landscape.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field; Master's degree preferred.
- Minimum of 7 years of experience in cybersecurity, with a strong focus on threat intelligence, incident response, or security operations.
- Proven expertise in threat actor profiling, malware analysis, network forensics, and forensic investigation techniques.
- Demonstrated ability to work independently and collaboratively in a remote environment, managing multiple priorities and deadlines.
- Expertise with threat intelligence platforms (TIPs), SIEM solutions, and endpoint detection and response (EDR) tools.
- Strong understanding of various operating systems, network protocols, and cloud security principles.
- Excellent written and verbal communication skills, with the ability to clearly articulate complex technical information to both technical and non-technical audiences.
- Relevant certifications such as CISSP, GIAC GCTI, GCFA, or similar are highly desirable.
- Experience with scripting languages (e.g., Python) for automation of intelligence gathering and analysis is a plus.
- Ability to maintain discretion and handle sensitive information confidentially.
Senior Cybersecurity Threat Intelligence Analyst
Posted 14 days ago
Job Viewed
Job Description
Key Responsibilities:
- Collect, process, and analyze threat intelligence data from diverse sources, including open-source intelligence (OSINT), dark web monitoring, and commercial threat feeds.
- Identify and track advanced persistent threats (APTs) and other sophisticated threat actors.
- Develop comprehensive threat profiles, TTP analyses, and predictive threat assessments.
- Produce high-quality intelligence reports, briefings, and alerts for various stakeholders, including executive leadership and technical teams.
- Provide timely and actionable intelligence to support incident response, vulnerability management, and security control implementation.
- Develop and maintain threat models and attack narratives to understand and anticipate adversary actions.
- Collaborate with internal security teams (SOC, IR, Forensics) to operationalize threat intelligence.
- Research and evaluate new threat intelligence tools, technologies, and methodologies.
- Mentor junior analysts and contribute to the continuous improvement of the threat intelligence program.
- Stay abreast of the latest cybersecurity trends, vulnerabilities, and threat landscapes.
- Participate in threat hunting activities based on intelligence-driven hypotheses.
- Develop and maintain relationships with external threat intelligence communities and information sharing groups.
- Automate intelligence collection and analysis processes where possible.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field; Master's degree preferred.
- Minimum of 6 years of experience in cybersecurity, with at least 4 years focused on threat intelligence.
- Deep understanding of cybersecurity principles, common attack vectors, and defensive strategies.
- Proficiency in analyzing malware, network traffic, and forensic data.
- Experience with threat intelligence platforms (TIPs), SIEMs, and other security tools.
- Strong knowledge of OSINT techniques and tools.
- Familiarity with scripting languages (e.g., Python) for automation is a plus.
- Excellent analytical, critical thinking, and problem-solving skills.
- Superior written and verbal communication skills, with the ability to present complex information effectively.
- Relevant certifications such as GIAC Certified Threat Intelligence (GCTI), CISSP, or CISM are highly desirable.
- Ability to work independently in a remote, fast-paced environment.