523 Cybersecurity Threat Intelligence Analyst jobs in Kenya
Cybersecurity Threat Intelligence Analyst
Posted 20 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor, collect, and analyze threat intelligence data from diverse sources, including open-source intelligence (OSINT), dark web forums, security feeds, and internal telemetry.
- Identify, assess, and prioritize emerging threats, vulnerabilities, and attack vectors relevant to the organization's environment.
- Develop and maintain threat profiles, actor TTPs (Tactics, Techniques, and Procedures), and indicators of compromise (IOCs).
- Produce timely and actionable threat intelligence reports and briefings for various stakeholders, including security operations, incident response, and executive leadership.
- Collaborate with incident response teams to provide context and support during security investigations.
- Develop and tune detection rules and security alerts based on threat intelligence.
- Stay abreast of the latest cybersecurity trends, attack methodologies, and threat actor activities.
- Participate in threat hunting exercises to proactively identify and mitigate potential security breaches.
- Contribute to the development and improvement of threat intelligence platforms and processes.
- Build relationships with external threat intelligence communities and law enforcement agencies.
- Evaluate and recommend new threat intelligence tools and technologies.
Knowledge of various threat actor groups, malware families, and attack frameworks (e.g., MITRE ATT&CK) is crucial. Certifications such as GIAC Certified Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), or equivalent are a significant advantage. If you are passionate about staying ahead of cyber adversaries and protecting organizations from evolving threats in a remote setting, we encourage you to apply.
Lead Cybersecurity Threat Intelligence Analyst
Posted 20 days ago
Job Viewed
Job Description
Remote Cybersecurity Threat Intelligence Analyst
Posted 20 days ago
Job Viewed
Job Description
Senior Cybersecurity Threat Intelligence Analyst
Posted 20 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze threat intelligence feeds, open-source intelligence (OSINT), and other relevant data sources to identify emerging threats and attack vectors.
- Develop and maintain profiles of threat actors, their motivations, and their typical TTPs.
- Conduct in-depth research into malware, exploits, and emerging cyber threats.
- Produce timely and actionable threat intelligence reports for various stakeholders, including security operations teams, incident response teams, and executive leadership.
- Develop and refine methodologies for threat hunting and proactive detection of advanced persistent threats (APTs).
- Collaborate with internal security teams to integrate threat intelligence into security controls, detection mechanisms, and incident response playbooks.
- Provide expert guidance on threat landscape trends and their implications for the organization.
- Contribute to the development and improvement of threat intelligence platforms and tools.
- Mentor junior analysts and contribute to the overall growth of the threat intelligence program.
- Stay current with the latest cybersecurity threats, vulnerabilities, and defensive strategies.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity, with at least 4 years focused on threat intelligence analysis.
- Deep understanding of threat actor methodologies, including the Cyber Kill Chain and MITRE ATT&CK framework.
- Proficiency in utilizing various threat intelligence platforms, SIEM tools, and data analysis techniques.
- Experience with OSINT gathering and analysis techniques.
- Strong understanding of network protocols, operating systems, and common cybersecurity vulnerabilities.
- Excellent analytical, critical thinking, and problem-solving skills.
- Exceptional written and verbal communication skills, with the ability to produce clear and concise intelligence reports.
- Proven ability to work independently and collaboratively in a 100% remote work environment.
- Relevant cybersecurity certifications (e.g., CISSP, GCTI, CEH) are highly desirable.
Lead Cybersecurity Threat Intelligence Analyst (Remote)
Posted 15 days ago
Job Viewed
Job Description
Senior Cybersecurity Threat Intelligence Analyst - Remote
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Collect, analyze, and interpret threat intelligence data from various sources, including open-source intelligence (OSINT), dark web forums, security feeds, and internal logs.
- Identify emerging cyber threats, attack vectors, and threat actor methodologies.
- Develop and maintain threat actor profiles, including their tactics, techniques, and procedures (TTPs).
- Produce high-quality threat intelligence reports, summaries, and alerts for security operations, incident response, and executive leadership.
- Provide strategic and tactical intelligence to inform security control development, incident response strategies, and vulnerability management efforts.
- Develop and implement threat hunting methodologies to proactively uncover advanced persistent threats (APTs).
- Collaborate with internal security teams, including incident responders and security engineers, to share intelligence and coordinate defensive actions.
- Stay current with the latest cybersecurity trends, vulnerabilities, and geopolitical factors influencing the threat landscape.
- Evaluate and recommend new threat intelligence tools and technologies.
- Mentor junior analysts and contribute to the overall growth and effectiveness of the threat intelligence team.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 6 years of experience in cybersecurity, with at least 3 years focused on threat intelligence analysis.
- Deep understanding of cyber threats, attack methodologies, malware analysis, and incident response.
- Proficiency in using threat intelligence platforms (TIPs), SIEM tools, and data analysis tools.
- Experience with OSINT techniques and tools for intelligence gathering.
- Knowledge of various threat actor groups and their motivations.
- Excellent analytical, research, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to articulate complex technical information clearly and concisely.
- Ability to work independently and collaboratively in a fast-paced, remote environment.
- Relevant certifications such as GIAC Certified Intelligence Analyst (GCIA), GIAC Certified Intrusion Analyst (GCIA), or Certified Threat Intelligence Analyst (CTIA) are a plus.
Cybersecurity Analyst, Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
As a remote-first professional, you will be responsible for monitoring various threat intelligence sources, including open-source intelligence (OSINT), dark web forums, security feeds, and vendor reports. You will develop and maintain intelligence collection requirements, identify emerging threats, and assess their potential impact on our business operations. This includes analyzing malware, identifying attacker tactics, techniques, and procedures (TTPs), and understanding the threat landscape relevant to our industry.
Your responsibilities will extend to developing and disseminating threat intelligence reports, briefings, and alerts to relevant stakeholders, including security operations centers (SOCs), incident response teams, and executive leadership. You will also contribute to the development and tuning of security tools and controls based on threat intelligence findings. This involves collaborating closely with internal security teams, including incident responders and security engineers, to operationalize intelligence and improve detection capabilities.
The ideal candidate will possess a strong understanding of cybersecurity principles, network security, and common attack vectors. You should be adept at using various threat intelligence platforms and analytical tools. Excellent analytical, critical thinking, and communication skills are essential, as is the ability to work independently and manage your time effectively in a remote work environment. We are looking for a proactive individual who is passionate about staying ahead of evolving cyber threats.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Relevant certifications (e.g., GIAC, CISSP, CompTIA Security+) are highly valued.
- Minimum of 3-5 years of experience in cybersecurity, with a specific focus on threat intelligence analysis, cybersecurity operations, or incident response.
- Proven experience in collecting, analyzing, and interpreting threat intelligence data from diverse sources.
- Strong understanding of TTPs, malware analysis, and threat hunting methodologies.
- Familiarity with threat intelligence platforms (TIPs) and SIEM solutions.
- Excellent written and verbal communication skills, with the ability to produce clear and concise intelligence reports.
- Demonstrated ability to work autonomously and effectively in a remote team environment.
- Proficiency in scripting languages (e.g., Python) for data analysis and automation is a plus.
- Experience related to cybersecurity threats affecting organizations in the Nakuru, Nakuru, KE region is beneficial but not required.
Be The First To Know
About the latest Cybersecurity threat intelligence analyst Jobs in Kenya !
Lead Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
The ideal candidate possesses a deep understanding of the current threat landscape, attack vectors, malware analysis, and adversary tactics, techniques, and procedures (TTPs). You will lead the threat intelligence team, mentor junior analysts, and collaborate closely with internal security teams, IT infrastructure, and external partners. Your responsibilities include developing and refining threat hunting methodologies, creating detailed threat reports, and presenting complex technical information to both technical and non-technical audiences. You will also contribute to the continuous improvement of security tools and processes, ensuring the organization remains resilient against evolving cyber threats. This role requires exceptional analytical prowess, strategic thinking, and the ability to perform effectively in a high-pressure, remote environment.
Responsibilities:
- Lead the collection, analysis, and dissemination of cyber threat intelligence.
- Identify and track emerging threats, vulnerabilities, and threat actors targeting the organization.
- Develop and maintain threat intelligence feeds and detection rules.
- Conduct advanced threat hunting exercises to uncover sophisticated threats.
- Analyze malware and forensic data to understand attack methodologies.
- Develop actionable intelligence reports and executive summaries for stakeholders.
- Collaborate with incident response teams to support investigations and remediation efforts.
- Mentor and guide junior cybersecurity analysts in threat analysis techniques.
- Contribute to the strategic development of the organization's cybersecurity posture.
- Evaluate and recommend new threat intelligence tools and technologies.
- Build and maintain relationships with external intelligence sharing communities and vendors.
- Stay current with the latest cybersecurity threats, trends, and defensive measures.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity, with a strong focus on threat intelligence, analysis, or incident response.
- Deep knowledge of various attack vectors, malware families, and TTPs.
- Proficiency with threat intelligence platforms (TIPs), SIEM tools, and security analytics tools.
- Experience with malware analysis, reverse engineering, and digital forensics is highly desirable.
- Strong understanding of networking protocols, operating systems, and cloud security.
- Excellent analytical, problem-solving, and critical thinking skills.
- Exceptional written and verbal communication skills, with the ability to present complex findings clearly.
- Demonstrated leadership experience and the ability to mentor a team.
- Relevant certifications such as CISSP, GIAC, OSCP are a strong asset.
- Ability to work independently and manage complex projects in a remote setting.
Remote Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
Senior Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
- Monitor, collect, and analyze threat intelligence from open-source, commercial, and internal sources.
- Identify emerging threats, vulnerabilities, and attacker campaigns relevant to the organization.
- Develop and maintain threat actor profiles and TTPs (Tactics, Techniques, and Procedures).
- Conduct threat hunting operations to proactively identify compromised systems or malicious activity.
- Produce timely and actionable threat intelligence reports, briefings, and alerts.
- Collaborate with Security Operations Center (SOC) and Incident Response (IR) teams to support investigations and remediation efforts.
- Develop and refine threat detection rules and signatures.
- Perform malware analysis to understand its behavior and indicators of compromise (IOCs).
- Provide subject matter expertise on threat intelligence to various stakeholders.
- Evaluate and recommend threat intelligence tools and platforms.
- Contribute to the development and improvement of the overall cybersecurity defense strategy.
- Stay current with the latest cybersecurity threats, vulnerabilities, and defense techniques.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field; Master's degree is a plus.
- Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence, incident response, or security analysis.
- Deep understanding of the current global threat landscape, including advanced persistent threats (APTs).
- Experience with various threat intelligence platforms and data feeds.
- Proficiency in analyzing security logs, network traffic, and forensic data.
- Knowledge of malware analysis techniques and tools.
- Experience with scripting languages (e.g., Python, PowerShell) for automation is highly desirable.
- Strong analytical, research, and critical thinking skills.
- Excellent written and verbal communication skills, including report writing and presentation abilities.
- Relevant certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), or Certified Threat Intelligence Analyst (CTIA) are a plus.
- Ability to work independently and collaboratively in a remote team environment.