3,147 Cybersecurity jobs in Kenya
Cybersecurity Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Key responsibilities include monitoring threat landscapes, researching emerging threats, vulnerabilities, and attack vectors. You will develop and maintain threat intelligence reports, briefs, and alerts for different audiences, ranging from technical teams to executive leadership. This involves understanding adversary tactics, techniques, and procedures (TTPs) and their potential impact on our infrastructure. You will utilize various threat intelligence platforms, tools, and data feeds to enhance our defensive capabilities. Collaborating with internal security teams, including incident response and security engineering, to translate intelligence into effective security controls and response strategies will be paramount. Staying abreast of the latest cybersecurity trends, threat actor methodologies, and geopolitical factors influencing cyber threats is essential.
The ideal candidate will possess a strong understanding of cybersecurity principles, network security, and common attack methodologies. Experience with threat intelligence platforms, SIEM solutions, and data analysis tools is highly desirable. Excellent analytical and problem-solving skills, coupled with strong written and verbal communication abilities, are required. You should be able to articulate complex technical information clearly and concisely. A proactive mindset and a commitment to continuous learning in the ever-evolving field of cybersecurity are essential. This role requires a detail-oriented individual who can work independently and as part of a team, contributing to the overall security posture of the organization. Familiarity with industry-standard frameworks such as MITRE ATT&CK is a plus.
Cybersecurity Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Responsibilities:
- Collect, analyze, and interpret threat intelligence from various sources.
- Identify and track cyber threat actors, their motives, and capabilities.
- Develop and disseminate timely threat intelligence reports and alerts.
- Assess the impact of threats on the organization's assets and operations.
- Provide actionable recommendations to improve security controls and defenses.
- Monitor the dark web and other relevant channels for emerging threats.
- Analyze malware samples and understand their behavior.
- Collaborate with incident response and security operations teams.
- Develop and maintain threat models and intelligence feeds.
- Contribute to strategic security planning based on intelligence insights.
Cybersecurity Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor, collect, and analyze threat intelligence data from diverse sources, including open-source intelligence (OSINT), dark web forums, security feeds, and internal telemetry.
- Identify, assess, and prioritize emerging threats, vulnerabilities, and attack vectors relevant to the organization's environment.
- Develop and maintain threat profiles, actor TTPs (Tactics, Techniques, and Procedures), and indicators of compromise (IOCs).
- Produce timely and actionable threat intelligence reports and briefings for various stakeholders, including security operations, incident response, and executive leadership.
- Collaborate with incident response teams to provide context and support during security investigations.
- Develop and tune detection rules and security alerts based on threat intelligence.
- Stay abreast of the latest cybersecurity trends, attack methodologies, and threat actor activities.
- Participate in threat hunting exercises to proactively identify and mitigate potential security breaches.
- Contribute to the development and improvement of threat intelligence platforms and processes.
- Build relationships with external threat intelligence communities and law enforcement agencies.
- Evaluate and recommend new threat intelligence tools and technologies.
Knowledge of various threat actor groups, malware families, and attack frameworks (e.g., MITRE ATT&CK) is crucial. Certifications such as GIAC Certified Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), or equivalent are a significant advantage. If you are passionate about staying ahead of cyber adversaries and protecting organizations from evolving threats in a remote setting, we encourage you to apply.
Cybersecurity Analyst - Threat Intelligence
Posted 2 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze global threat intelligence feeds, OSINT, and dark web sources.
- Identify, track, and profile threat actors and their motivations.
- Analyze adversary TTPs and develop strategic defense recommendations.
- Produce detailed threat intelligence reports, briefings, and alerts.
- Collaborate with incident response, SOC, and engineering teams to operationalize intelligence.
- Develop and maintain threat models and assessments.
- Provide guidance on vulnerability management and proactive security measures.
- Stay abreast of emerging threats, vulnerabilities, and attack vectors.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent practical experience.
- Proven experience in threat intelligence, security analysis, or a related cybersecurity role.
- Strong understanding of threat actor methodologies, TTPs, and malware analysis.
- Proficiency in using threat intelligence platforms and tools (e.g., MISP, Anomali, Recorded Future).
- Experience with OSINT techniques and tools.
- Excellent analytical, critical thinking, and problem-solving skills.
- Exceptional written and verbal communication skills for reporting and presentations.
- Ability to work autonomously and manage time effectively in a remote setting.
- Relevant certifications (e.g., GCTI, CISSP, CEH) are a plus.
Cybersecurity Analyst, Threat Intelligence
Posted 2 days ago
Job Viewed
Job Description
As a remote-first professional, you will be responsible for monitoring various threat intelligence sources, including open-source intelligence (OSINT), dark web forums, security feeds, and vendor reports. You will develop and maintain intelligence collection requirements, identify emerging threats, and assess their potential impact on our business operations. This includes analyzing malware, identifying attacker tactics, techniques, and procedures (TTPs), and understanding the threat landscape relevant to our industry.
Your responsibilities will extend to developing and disseminating threat intelligence reports, briefings, and alerts to relevant stakeholders, including security operations centers (SOCs), incident response teams, and executive leadership. You will also contribute to the development and tuning of security tools and controls based on threat intelligence findings. This involves collaborating closely with internal security teams, including incident responders and security engineers, to operationalize intelligence and improve detection capabilities.
The ideal candidate will possess a strong understanding of cybersecurity principles, network security, and common attack vectors. You should be adept at using various threat intelligence platforms and analytical tools. Excellent analytical, critical thinking, and communication skills are essential, as is the ability to work independently and manage your time effectively in a remote work environment. We are looking for a proactive individual who is passionate about staying ahead of evolving cyber threats.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Relevant certifications (e.g., GIAC, CISSP, CompTIA Security+) are highly valued.
- Minimum of 3-5 years of experience in cybersecurity, with a specific focus on threat intelligence analysis, cybersecurity operations, or incident response.
- Proven experience in collecting, analyzing, and interpreting threat intelligence data from diverse sources.
- Strong understanding of TTPs, malware analysis, and threat hunting methodologies.
- Familiarity with threat intelligence platforms (TIPs) and SIEM solutions.
- Excellent written and verbal communication skills, with the ability to produce clear and concise intelligence reports.
- Demonstrated ability to work autonomously and effectively in a remote team environment.
- Proficiency in scripting languages (e.g., Python) for data analysis and automation is a plus.
- Experience related to cybersecurity threats affecting organizations in the Nakuru, Nakuru, KE region is beneficial but not required.
Cybersecurity Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Cybersecurity Analyst, Threat Intelligence
Posted 2 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze security alerts from various sources, including SIEM, IDS/IPS, and threat intelligence feeds.
- Conduct in-depth research on emerging threats, vulnerabilities, and attack vectors relevant to the organization.
- Develop and maintain threat profiles, indicators of compromise (IOCs), and threat actor TTPs (Tactics, Techniques, and Procedures).
- Collaborate with incident response teams to provide timely and accurate threat intelligence during security incidents.
- Create and disseminate threat intelligence reports to relevant stakeholders, including technical teams and executive leadership.
- Contribute to the enhancement of security tools and processes to improve threat detection and prevention capabilities.
- Participate in security awareness training and communicate potential threats to employees.
- Stay abreast of the latest cybersecurity trends, technologies, and best practices.
- Perform vulnerability assessments and penetration testing coordination as needed.
- Develop and maintain relationships with external threat intelligence communities and information sharing groups.
Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Relevant certifications (e.g., GCTI, CISSP, Security+) are highly desirable.
- Minimum of 3 years of experience in cybersecurity, with a focus on threat intelligence, security operations, or incident response.
- Strong understanding of common attack vectors, malware analysis, and digital forensics principles.
- Proficiency in using threat intelligence platforms and security tools.
- Excellent analytical, critical thinking, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to articulate complex technical information clearly.
- Ability to work effectively both independently and as part of a team.
- Experience with scripting languages (e.g., Python, PowerShell) for automation is a plus.
- Knowledge of relevant compliance frameworks (e.g., ISO 27001, GDPR).
- A keen interest in staying ahead of cyber adversaries.
This hybrid role requires a candidate who can contribute effectively both in the office and remotely, supporting our security posture within Kericho, Kericho, KE .
Be The First To Know
About the latest Cybersecurity Jobs in Kenya !
Cybersecurity Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze threat intelligence feeds from various sources (e.g., OSINT, commercial feeds, government advisories).
- Identify emerging threats, vulnerabilities, and attack vectors relevant to the organization.
- Develop and maintain threat actor profiles, including their motivations, TTPs, and infrastructure.
- Conduct in-depth analysis of cyber threats and their potential impact on the business.
- Produce timely and actionable threat intelligence reports for various stakeholders.
- Support incident response activities by providing context and indicators of compromise (IOCs).
- Collaborate with security operations center (SOC) and incident response teams.
- Develop and refine threat models and hunting hypotheses.
- Contribute to the enhancement of security tools and processes based on threat intelligence.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field, or equivalent practical experience.
- Proven experience in cybersecurity, with a focus on threat intelligence, security operations, or incident response.
- Strong understanding of threat landscapes, malware analysis, and network security principles.
- Familiarity with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
- Experience with scripting languages (e.g., Python) for data analysis and automation is a plus.
- Excellent analytical and problem-solving skills.
- Strong written and verbal communication skills, with the ability to present complex information clearly.
- Ability to work effectively in a hybrid work environment.
Cybersecurity Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Senior Cybersecurity Analyst (Threat Intelligence)
Posted today
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze global threat intelligence feeds, including open-source intelligence (OSINT), dark web monitoring, and commercial threat intelligence platforms.
- Identify emerging threats, vulnerabilities, and attack vectors relevant to our client's infrastructure and industry.
- Conduct in-depth research on threat actors, their motives, capabilities, and tactics, techniques, and procedures (TTPs).
- Develop and maintain threat profiles and intelligence reports for various stakeholders, including technical teams and executive leadership.
- Provide actionable intelligence to security operations teams (SOC) to enhance detection and response capabilities.
- Contribute to the development and refinement of threat hunting methodologies and playbooks.
- Assess the potential impact of identified threats on the organization's security posture.
- Collaborate with incident response teams to support investigations and provide real-time threat context.
- Develop and present findings, recommendations, and strategic insights to management.
- Stay current with the latest cybersecurity trends, vulnerabilities, and defensive technologies.
- Evaluate and recommend new threat intelligence tools and methodologies.
- Mentor junior analysts and contribute to the overall growth of the threat intelligence function.
Qualifications:
- Bachelor's or Master's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- 5+ years of experience in cybersecurity, with a significant focus on threat intelligence, security operations, or incident response.
- Proven experience in collecting, analyzing, and reporting on threat intelligence data.
- In-depth knowledge of attacker TTPs, malware analysis, and cybercrime trends.
- Familiarity with threat intelligence frameworks (e.g., MITRE ATT&CK).
- Experience with security information and event management (SIEM) systems and threat intelligence platforms.
- Strong analytical, research, and problem-solving skills.
- Excellent written and verbal communication skills, with the ability to explain complex technical concepts to non-technical audiences.
- Ability to work independently and collaboratively in a remote, fast-paced environment.
- Relevant certifications such as CISSP, GIAC (GCIH, GCFA, GCTI), or similar are highly valued.
- Proficiency in scripting languages (e.g., Python) for automation is a plus.
This fully remote position allows you to secure critical digital assets from anywhere, contributing to robust information security efforts from locations like Kitale, Trans-Nzoia, KE .