375 Lead Cybersecurity Threat Analyst jobs in Kenya
Lead Cybersecurity Threat Analyst
Posted 20 days ago
Job Viewed
Job Description
Lead Cybersecurity Threat Analyst (Remote)
Posted 9 days ago
Job Viewed
Job Description
Responsibilities:
- Lead the threat intelligence gathering, analysis, and dissemination process.
- Develop and implement advanced threat detection and hunting methodologies.
- Analyze and interpret security alerts, logs, and network traffic for suspicious activities.
- Conduct in-depth investigations of security incidents, including root cause analysis and impact assessment.
- Develop and refine incident response playbooks and procedures.
- Provide technical leadership and mentorship to a team of cybersecurity analysts.
- Collaborate with IT and security teams to implement security controls and remediation efforts.
- Stay current with the latest threat actors, attack vectors, vulnerabilities, and cybersecurity trends.
- Develop and maintain threat models and risk assessments for the organization.
- Author clear and concise reports on threat landscape, incident findings, and recommendations for management.
- Utilize SIEM, EDR, SOAR, and other security tools for effective monitoring and response.
- Represent the security team in cross-functional meetings and discussions.
- Contribute to the continuous improvement of security operations processes and technologies.
- Manage and prioritize multiple ongoing investigations and projects.
- Bachelor's or Master's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity, with a significant focus on threat analysis, incident response, or security operations.
- Proven experience leading a security analysis team.
- In-depth knowledge of various attack vectors, TTPs (Tactics, Techniques, and Procedures), and threat intelligence frameworks (e.g., MITRE ATT&CK).
- Expertise in utilizing SIEM platforms (e.g., Splunk, QRadar), EDR solutions, and network security monitoring tools.
- Experience with malware analysis (static and dynamic) and reverse engineering techniques is highly desirable.
- Strong understanding of networking protocols, operating systems (Windows, Linux), and cloud security concepts (AWS, Azure, GCP).
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to articulate technical concepts to diverse audiences.
- Ability to work independently, manage priorities effectively, and thrive in a fast-paced remote environment.
- Relevant certifications such as CISSP, GCTI, GCFA, CEH, or OSCP are a strong advantage.
- Must have a secure and reliable home office setup with high-speed internet.
Lead Cybersecurity Threat Intelligence Analyst
Posted 20 days ago
Job Viewed
Job Description
Lead Cybersecurity Threat Intelligence Analyst (Remote)
Posted 15 days ago
Job Viewed
Job Description
Lead Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
The ideal candidate possesses a deep understanding of the current threat landscape, attack vectors, malware analysis, and adversary tactics, techniques, and procedures (TTPs). You will lead the threat intelligence team, mentor junior analysts, and collaborate closely with internal security teams, IT infrastructure, and external partners. Your responsibilities include developing and refining threat hunting methodologies, creating detailed threat reports, and presenting complex technical information to both technical and non-technical audiences. You will also contribute to the continuous improvement of security tools and processes, ensuring the organization remains resilient against evolving cyber threats. This role requires exceptional analytical prowess, strategic thinking, and the ability to perform effectively in a high-pressure, remote environment.
Responsibilities:
- Lead the collection, analysis, and dissemination of cyber threat intelligence.
- Identify and track emerging threats, vulnerabilities, and threat actors targeting the organization.
- Develop and maintain threat intelligence feeds and detection rules.
- Conduct advanced threat hunting exercises to uncover sophisticated threats.
- Analyze malware and forensic data to understand attack methodologies.
- Develop actionable intelligence reports and executive summaries for stakeholders.
- Collaborate with incident response teams to support investigations and remediation efforts.
- Mentor and guide junior cybersecurity analysts in threat analysis techniques.
- Contribute to the strategic development of the organization's cybersecurity posture.
- Evaluate and recommend new threat intelligence tools and technologies.
- Build and maintain relationships with external intelligence sharing communities and vendors.
- Stay current with the latest cybersecurity threats, trends, and defensive measures.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity, with a strong focus on threat intelligence, analysis, or incident response.
- Deep knowledge of various attack vectors, malware families, and TTPs.
- Proficiency with threat intelligence platforms (TIPs), SIEM tools, and security analytics tools.
- Experience with malware analysis, reverse engineering, and digital forensics is highly desirable.
- Strong understanding of networking protocols, operating systems, and cloud security.
- Excellent analytical, problem-solving, and critical thinking skills.
- Exceptional written and verbal communication skills, with the ability to present complex findings clearly.
- Demonstrated leadership experience and the ability to mentor a team.
- Relevant certifications such as CISSP, GIAC, OSCP are a strong asset.
- Ability to work independently and manage complex projects in a remote setting.
Lead Cybersecurity Analyst (Threat Detection & Incident Response)
Posted 9 days ago
Job Viewed
Job Description
Location: This position is fully remote and is aligned with **Naivasha, Nakuru, KE**. We encourage motivated individuals seeking to make a substantial contribution to cybersecurity resilience.
Responsibilities:
- Lead the development and implementation of security monitoring and threat detection strategies.
- Oversee the incident response process, including containment, eradication, and recovery.
- Analyze security alerts and logs from various sources to identify and investigate potential threats.
- Conduct forensic analysis of security incidents to determine root cause and impact.
- Develop and maintain playbooks and procedures for incident response.
- Manage and tune SIEM, IDS/IPS, and other security tools.
- Perform vulnerability assessments and penetration testing.
- Stay current with emerging cybersecurity threats, vulnerabilities, and technologies.
- Provide technical leadership and mentorship to the cybersecurity team.
- Communicate security risks and incident status to management and relevant stakeholders.
- Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field.
- 5+ years of progressive experience in cybersecurity, with a focus on threat detection and incident response.
- Proven experience managing and leading cybersecurity teams.
- In-depth knowledge of SIEM platforms (e.g., Splunk, QRadar, ELK Stack).
- Hands-on experience with network security tools, endpoint security solutions, and forensic tools.
- Strong understanding of operating systems (Windows, Linux), networking protocols, and cloud security.
- Experience with scripting languages (e.g., Python, PowerShell) for automation.
- Relevant cybersecurity certifications (e.g., CISSP, GIAC, CEH) are highly desirable.
- Exceptional analytical, problem-solving, and critical thinking skills.
- Excellent written and verbal communication skills.
Lead Information Security Analyst (Cyber Threat Intelligence)
Posted 10 days ago
Job Viewed
Job Description
Key Responsibilities:
- Develop, manage, and mature the organization's Cyber Threat Intelligence program.
- Monitor, collect, and analyze threat data from various sources, including open-source intelligence (OSINT), dark web forums, threat feeds, and internal security telemetry.
- Identify and track advanced persistent threats (APTs), malware campaigns, and other cyber adversary activities relevant to the organization's sector.
- Produce timely and actionable threat intelligence reports, briefings, and alerts for stakeholders, including executive leadership, security operations, and incident response teams.
- Develop and maintain threat actor profiles, including their TTPs (Tactics, Techniques, and Procedures).
- Design and implement threat hunting methodologies based on intelligence findings.
- Collaborate with security operations (SecOps) and incident response (IR) teams to provide context and support during security incidents.
- Build and maintain relationships with external threat intelligence providers and peer organizations.
- Develop and implement metrics to measure the effectiveness of the CTI program.
- Stay abreast of the latest cybersecurity trends, vulnerabilities, and attack vectors.
- Provide subject matter expertise on threat intelligence to internal teams and management.
Qualifications:
- Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent practical experience.
- Minimum of 8 years of experience in information security, with at least 5 years focused on cyber threat intelligence.
- Demonstrated experience in developing and leading CTI programs.
- In-depth knowledge of threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
- Proficiency in utilizing various intelligence gathering tools and platforms (e.g., MISP, SIEM, TIPs).
- Strong analytical and investigative skills with the ability to synthesize complex information into clear, concise intelligence.
- Excellent written and verbal communication skills, with the ability to present technical information to diverse audiences.
- Experience with scripting languages (e.g., Python) for automation of intelligence collection and analysis is highly desirable.
- Relevant certifications such as GIAC Certified Threat Intelligence (GCTI) or equivalent are a plus.
- Proven ability to work independently and collaboratively in a remote environment.
- Understanding of geopolitical factors influencing cyber threats.
Location: Machakos, Machakos, KE (Remote)
Be The First To Know
About the latest Lead cybersecurity threat analyst Jobs in Kenya !
Senior Information Security Analyst (Cyber Threat Intelligence)
Posted 15 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze threat intelligence feeds, security alerts, and incident data from various sources.
- Identify, track, and attribute threat actors and their tactics, techniques, and procedures (TTPs).
- Develop actionable intelligence reports and briefings for security leadership and operational teams.
- Conduct in-depth research on emerging threats, vulnerabilities, and attack trends.
- Support incident response activities by providing timely and relevant threat context.
- Develop and maintain threat models and profiles for the organization.
- Contribute to the enhancement of security monitoring and detection capabilities based on intelligence findings.
- Collaborate with internal security teams (SOC, IR, Vulnerability Management) to operationalize threat intelligence.
- Develop and implement intelligence requirements and collection plans.
- Build and maintain relationships with external threat intelligence communities and information sharing groups.
- Utilize threat intelligence platforms and analytical tools effectively.
- Provide expert analysis and recommendations on security posture improvements.
- Stay current with geopolitical events and their impact on the cyber threat landscape.
- Contribute to the development of security awareness training based on intelligence insights.
- Document intelligence processes, methodologies, and findings.
Required Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, or a related field. Relevant certifications (e.g., CISSP, GIAC) are a plus.
- 5+ years of experience in information security, with a specialization in cyber threat intelligence.
- Demonstrated experience in collecting, analyzing, and disseminating threat intelligence.
- In-depth knowledge of threat actor TTPs, malware analysis, and cyber attack methodologies.
- Familiarity with threat intelligence platforms, OSINT techniques, and data analysis tools.
- Strong understanding of network security, endpoint security, and cloud security concepts.
- Excellent analytical, research, and written and verbal communication skills.
- Ability to work independently and collaboratively in a remote, fast-paced environment.
Remote Information Security Analyst (Cyber Threat Intelligence)
Posted 20 days ago
Job Viewed
Job Description
- Monitoring open-source intelligence (OSINT), dark web forums, and other sources for emerging cyber threats.
- Analyzing threat actor tactics, techniques, and procedures (TTPs).
- Developing and disseminating timely threat intelligence reports to relevant stakeholders.
- Identifying vulnerabilities and potential attack vectors targeting the organization.
- Collaborating with incident response teams to support investigations and remediation efforts.
- Recommending security controls and best practices to mitigate identified risks.
- Assisting in the development and maintenance of threat intelligence platforms and tools.
- Conducting threat hunting activities to uncover potential compromises.
- Staying current with the latest cybersecurity trends, vulnerabilities, and exploits.
- Contributing to the overall security awareness and training programs.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 4 years of experience in information security, with a specialization in threat intelligence or security operations.
- Strong understanding of common cyber threats, attack vectors, and defense mechanisms.
- Proficiency in using threat intelligence tools and platforms (e.g., MISP, Recorded Future, Shodan).
- Experience with SIEM (Security Information and Event Management) systems.
- Excellent analytical, research, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to produce clear and concise threat reports.
- Ability to work independently, manage multiple research streams, and meet deadlines in a remote environment.
- Relevant certifications such as GIAC (GCTI, GCFA), CompTIA Security+, or CISSP are highly desirable.
- Familiarity with scripting languages (e.g., Python) for data analysis is a plus.
Lead Remote Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed