462 Cybersecurity Analyst Threat Intelligence jobs in Kenya
Cybersecurity Analyst, Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
As a remote-first professional, you will be responsible for monitoring various threat intelligence sources, including open-source intelligence (OSINT), dark web forums, security feeds, and vendor reports. You will develop and maintain intelligence collection requirements, identify emerging threats, and assess their potential impact on our business operations. This includes analyzing malware, identifying attacker tactics, techniques, and procedures (TTPs), and understanding the threat landscape relevant to our industry.
Your responsibilities will extend to developing and disseminating threat intelligence reports, briefings, and alerts to relevant stakeholders, including security operations centers (SOCs), incident response teams, and executive leadership. You will also contribute to the development and tuning of security tools and controls based on threat intelligence findings. This involves collaborating closely with internal security teams, including incident responders and security engineers, to operationalize intelligence and improve detection capabilities.
The ideal candidate will possess a strong understanding of cybersecurity principles, network security, and common attack vectors. You should be adept at using various threat intelligence platforms and analytical tools. Excellent analytical, critical thinking, and communication skills are essential, as is the ability to work independently and manage your time effectively in a remote work environment. We are looking for a proactive individual who is passionate about staying ahead of evolving cyber threats.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Relevant certifications (e.g., GIAC, CISSP, CompTIA Security+) are highly valued.
- Minimum of 3-5 years of experience in cybersecurity, with a specific focus on threat intelligence analysis, cybersecurity operations, or incident response.
- Proven experience in collecting, analyzing, and interpreting threat intelligence data from diverse sources.
- Strong understanding of TTPs, malware analysis, and threat hunting methodologies.
- Familiarity with threat intelligence platforms (TIPs) and SIEM solutions.
- Excellent written and verbal communication skills, with the ability to produce clear and concise intelligence reports.
- Demonstrated ability to work autonomously and effectively in a remote team environment.
- Proficiency in scripting languages (e.g., Python) for data analysis and automation is a plus.
- Experience related to cybersecurity threats affecting organizations in the Nakuru, Nakuru, KE region is beneficial but not required.
Lead Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
The ideal candidate possesses a deep understanding of the current threat landscape, attack vectors, malware analysis, and adversary tactics, techniques, and procedures (TTPs). You will lead the threat intelligence team, mentor junior analysts, and collaborate closely with internal security teams, IT infrastructure, and external partners. Your responsibilities include developing and refining threat hunting methodologies, creating detailed threat reports, and presenting complex technical information to both technical and non-technical audiences. You will also contribute to the continuous improvement of security tools and processes, ensuring the organization remains resilient against evolving cyber threats. This role requires exceptional analytical prowess, strategic thinking, and the ability to perform effectively in a high-pressure, remote environment.
Responsibilities:
- Lead the collection, analysis, and dissemination of cyber threat intelligence.
- Identify and track emerging threats, vulnerabilities, and threat actors targeting the organization.
- Develop and maintain threat intelligence feeds and detection rules.
- Conduct advanced threat hunting exercises to uncover sophisticated threats.
- Analyze malware and forensic data to understand attack methodologies.
- Develop actionable intelligence reports and executive summaries for stakeholders.
- Collaborate with incident response teams to support investigations and remediation efforts.
- Mentor and guide junior cybersecurity analysts in threat analysis techniques.
- Contribute to the strategic development of the organization's cybersecurity posture.
- Evaluate and recommend new threat intelligence tools and technologies.
- Build and maintain relationships with external intelligence sharing communities and vendors.
- Stay current with the latest cybersecurity threats, trends, and defensive measures.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity, with a strong focus on threat intelligence, analysis, or incident response.
- Deep knowledge of various attack vectors, malware families, and TTPs.
- Proficiency with threat intelligence platforms (TIPs), SIEM tools, and security analytics tools.
- Experience with malware analysis, reverse engineering, and digital forensics is highly desirable.
- Strong understanding of networking protocols, operating systems, and cloud security.
- Excellent analytical, problem-solving, and critical thinking skills.
- Exceptional written and verbal communication skills, with the ability to present complex findings clearly.
- Demonstrated leadership experience and the ability to mentor a team.
- Relevant certifications such as CISSP, GIAC, OSCP are a strong asset.
- Ability to work independently and manage complex projects in a remote setting.
Remote Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
Senior Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
- Monitor, collect, and analyze threat intelligence from open-source, commercial, and internal sources.
- Identify emerging threats, vulnerabilities, and attacker campaigns relevant to the organization.
- Develop and maintain threat actor profiles and TTPs (Tactics, Techniques, and Procedures).
- Conduct threat hunting operations to proactively identify compromised systems or malicious activity.
- Produce timely and actionable threat intelligence reports, briefings, and alerts.
- Collaborate with Security Operations Center (SOC) and Incident Response (IR) teams to support investigations and remediation efforts.
- Develop and refine threat detection rules and signatures.
- Perform malware analysis to understand its behavior and indicators of compromise (IOCs).
- Provide subject matter expertise on threat intelligence to various stakeholders.
- Evaluate and recommend threat intelligence tools and platforms.
- Contribute to the development and improvement of the overall cybersecurity defense strategy.
- Stay current with the latest cybersecurity threats, vulnerabilities, and defense techniques.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field; Master's degree is a plus.
- Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence, incident response, or security analysis.
- Deep understanding of the current global threat landscape, including advanced persistent threats (APTs).
- Experience with various threat intelligence platforms and data feeds.
- Proficiency in analyzing security logs, network traffic, and forensic data.
- Knowledge of malware analysis techniques and tools.
- Experience with scripting languages (e.g., Python, PowerShell) for automation is highly desirable.
- Strong analytical, research, and critical thinking skills.
- Excellent written and verbal communication skills, including report writing and presentation abilities.
- Relevant certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), or Certified Threat Intelligence Analyst (CTIA) are a plus.
- Ability to work independently and collaboratively in a remote team environment.
Lead Remote Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
Senior Remote Cybersecurity Analyst - Threat Intelligence
Posted 15 days ago
Job Viewed
Job Description
Responsibilities:
- Proactively hunt for threats within the organization's network and systems by analyzing security alerts, logs, and network traffic.
- Develop and implement threat intelligence gathering methodologies from various sources, including open-source intelligence (OSINT), commercial feeds, and dark web monitoring.
- Analyze and interpret threat data to identify patterns, trends, and indicators of compromise (IOCs).
- Generate actionable threat intelligence reports and briefings for various stakeholders, including security operations, incident response, and executive leadership.
- Develop and maintain threat models, attack vectors, and adversary profiles relevant to the organization's industry and infrastructure.
- Collaborate with the incident response team to provide timely and accurate threat information during active security incidents.
- Develop and tune security detection rules and signatures based on threat intelligence findings.
- Conduct research on new and emerging cyber threats, vulnerabilities, and attack techniques.
- Advise on security control improvements and architectural changes based on threat landscape analysis.
- Mentor and guide junior cybersecurity analysts, fostering a culture of continuous learning and improvement.
- Contribute to the development and refinement of the threat intelligence platform and tools.
- Participate in threat hunting exercises and red team/blue team engagements.
- Build and maintain relationships with external threat intelligence communities and law enforcement agencies.
- Ensure the confidentiality and integrity of sensitive threat intelligence data.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 5-7 years of experience in cybersecurity, with at least 3 years focused on threat intelligence, threat hunting, or incident response.
- Proven expertise in analyzing various types of threat data, including malware, network telemetry, and forensic artifacts.
- Strong understanding of cyberattack methodologies, tactics, techniques, and procedures (TTPs) used by advanced persistent threats (APTs).
- Proficiency with threat intelligence platforms (TIPs), SIEM systems (e.g., Splunk, ELK Stack), and security orchestration, automation, and response (SOAR) tools.
- Experience with scripting languages (e.g., Python, PowerShell) for automating analysis and data collection.
- Excellent analytical, problem-solving, and critical-thinking skills.
- Strong written and verbal communication skills, with the ability to present complex technical information clearly and concisely.
- Ability to work independently, manage critical tasks under pressure, and collaborate effectively in a remote, distributed team environment.
- Relevant certifications such as GIAC GCTI, GCIH, GCFA, or CISSP are highly desirable.
Remote Senior Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze threat intelligence feeds, security alerts, and incident data to identify potential cyber threats and vulnerabilities.
- Develop and maintain threat models and profiles for relevant threat actors and their TTPs (Tactics, Techniques, and Procedures).
- Conduct in-depth research on emerging cybersecurity threats, malware, and attack vectors.
- Produce timely and actionable threat intelligence reports for various stakeholders, including executive leadership and technical teams.
- Collaborate with incident response teams to provide context and support during security investigations.
- Develop and implement strategies for the collection, enrichment, and dissemination of threat intelligence.
- Utilize a variety of security tools and technologies, including SIEM, IDS/IPS, EDR, and threat intelligence platforms.
- Participate in threat hunting activities to proactively identify and neutralize potential threats within the network.
- Stay abreast of the latest cybersecurity trends, vulnerabilities, and attack methodologies.
- Contribute to the development and improvement of security policies and procedures.
- Provide guidance and mentorship to junior cybersecurity analysts.
- Communicate complex technical information clearly and concisely to both technical and non-technical audiences.
- Participate in security awareness training and outreach programs.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Master's degree preferred.
- Minimum of 5 years of progressive experience in cybersecurity, with a significant focus on threat intelligence analysis.
- Demonstrated experience with threat intelligence platforms, SIEM tools, and other security monitoring solutions.
- Strong understanding of network security principles, operating systems (Windows, Linux), and common attack vectors.
- Proficiency in scripting languages (e.g., Python) for automating analysis and data processing.
- Experience with malware analysis techniques and tools.
- Excellent analytical, research, and problem-solving skills.
- Superior written and verbal communication skills, with the ability to produce high-quality intelligence reports.
- Ability to work independently, manage time effectively, and collaborate seamlessly within a remote team environment.
- Relevant cybersecurity certifications (e.g., CISSP, GCIH, GCFA) are highly desirable.
This is a critical role for maintaining our client's security posture, offering a challenging and rewarding career in a fully remote setting.
Be The First To Know
About the latest Cybersecurity analyst threat intelligence Jobs in Kenya !
Senior Cybersecurity Analyst - Threat Intelligence (Remote)
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze the global threat landscape for emerging cyber threats and vulnerabilities.
- Research and investigate threat actor TTPs, motivations, and infrastructure.
- Develop and maintain threat intelligence feeds and indicators of compromise (IOCs).
- Correlate data from various sources (OSINT, commercial feeds, internal logs) to identify threats.
- Produce actionable threat intelligence reports for technical and executive audiences.
- Collaborate with Security Operations Center (SOC) and Incident Response teams to integrate intelligence.
- Develop threat models and scenarios to assess organizational risk.
- Contribute to the development and refinement of threat hunting methodologies.
- Stay abreast of the latest cybersecurity trends, tools, and techniques.
- Participate in cybersecurity communities and information sharing groups.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 6 years of experience in cybersecurity, with a strong focus on threat intelligence or security analysis.
- In-depth knowledge of cyber threat actors, TTPs, and attack vectors.
- Experience with threat intelligence platforms (TIPs) and SIEM solutions (e.g., Splunk, QRadar).
- Proficiency in data analysis, malware analysis, and network forensics.
- Strong research and analytical skills with the ability to interpret complex data.
- Excellent written and verbal communication skills, with the ability to produce clear reports.
- Ability to work independently and manage priorities effectively in a remote setting.
- Relevant certifications such as CISSP, CEH, GIAC are a plus.
- Understanding of geopolitical factors influencing cyber threats is beneficial.
Cybersecurity Threat Intelligence Analyst
Posted 20 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor, collect, and analyze threat intelligence data from diverse sources, including open-source intelligence (OSINT), dark web forums, security feeds, and internal telemetry.
- Identify, assess, and prioritize emerging threats, vulnerabilities, and attack vectors relevant to the organization's environment.
- Develop and maintain threat profiles, actor TTPs (Tactics, Techniques, and Procedures), and indicators of compromise (IOCs).
- Produce timely and actionable threat intelligence reports and briefings for various stakeholders, including security operations, incident response, and executive leadership.
- Collaborate with incident response teams to provide context and support during security investigations.
- Develop and tune detection rules and security alerts based on threat intelligence.
- Stay abreast of the latest cybersecurity trends, attack methodologies, and threat actor activities.
- Participate in threat hunting exercises to proactively identify and mitigate potential security breaches.
- Contribute to the development and improvement of threat intelligence platforms and processes.
- Build relationships with external threat intelligence communities and law enforcement agencies.
- Evaluate and recommend new threat intelligence tools and technologies.
Knowledge of various threat actor groups, malware families, and attack frameworks (e.g., MITRE ATT&CK) is crucial. Certifications such as GIAC Certified Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), or equivalent are a significant advantage. If you are passionate about staying ahead of cyber adversaries and protecting organizations from evolving threats in a remote setting, we encourage you to apply.
Lead Cybersecurity Threat Intelligence Analyst
Posted 20 days ago
Job Viewed