462 Remote Cybersecurity Analyst Threat Intelligence jobs in Kenya
Remote Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
Lead Remote Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
Senior Remote Cybersecurity Analyst - Threat Intelligence
Posted 15 days ago
Job Viewed
Job Description
Responsibilities:
- Proactively hunt for threats within the organization's network and systems by analyzing security alerts, logs, and network traffic.
- Develop and implement threat intelligence gathering methodologies from various sources, including open-source intelligence (OSINT), commercial feeds, and dark web monitoring.
- Analyze and interpret threat data to identify patterns, trends, and indicators of compromise (IOCs).
- Generate actionable threat intelligence reports and briefings for various stakeholders, including security operations, incident response, and executive leadership.
- Develop and maintain threat models, attack vectors, and adversary profiles relevant to the organization's industry and infrastructure.
- Collaborate with the incident response team to provide timely and accurate threat information during active security incidents.
- Develop and tune security detection rules and signatures based on threat intelligence findings.
- Conduct research on new and emerging cyber threats, vulnerabilities, and attack techniques.
- Advise on security control improvements and architectural changes based on threat landscape analysis.
- Mentor and guide junior cybersecurity analysts, fostering a culture of continuous learning and improvement.
- Contribute to the development and refinement of the threat intelligence platform and tools.
- Participate in threat hunting exercises and red team/blue team engagements.
- Build and maintain relationships with external threat intelligence communities and law enforcement agencies.
- Ensure the confidentiality and integrity of sensitive threat intelligence data.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 5-7 years of experience in cybersecurity, with at least 3 years focused on threat intelligence, threat hunting, or incident response.
- Proven expertise in analyzing various types of threat data, including malware, network telemetry, and forensic artifacts.
- Strong understanding of cyberattack methodologies, tactics, techniques, and procedures (TTPs) used by advanced persistent threats (APTs).
- Proficiency with threat intelligence platforms (TIPs), SIEM systems (e.g., Splunk, ELK Stack), and security orchestration, automation, and response (SOAR) tools.
- Experience with scripting languages (e.g., Python, PowerShell) for automating analysis and data collection.
- Excellent analytical, problem-solving, and critical-thinking skills.
- Strong written and verbal communication skills, with the ability to present complex technical information clearly and concisely.
- Ability to work independently, manage critical tasks under pressure, and collaborate effectively in a remote, distributed team environment.
- Relevant certifications such as GIAC GCTI, GCIH, GCFA, or CISSP are highly desirable.
Remote Cybersecurity Threat Intelligence Analyst
Posted 20 days ago
Job Viewed
Job Description
Senior Cybersecurity Analyst - Remote Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze security events and alerts from various security tools (SIEM, IDS/IPS, EDR).
- Investigate security incidents, perform root cause analysis, and develop containment strategies.
- Conduct advanced threat hunting activities to proactively identify and neutralize emerging threats.
- Research, analyze, and report on global cyber threats, actors, and tactics, techniques, and procedures (TTPs).
- Develop and maintain threat intelligence feeds and knowledge bases.
- Create comprehensive threat intelligence reports and briefings for technical and executive audiences.
- Provide expert recommendations for improving security controls, detection capabilities, and incident response processes.
- Collaborate with incident response teams to provide real-time threat context during active investigations.
- Stay abreast of the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
- Participate in security awareness training and knowledge sharing initiatives.
- Develop and refine security playbooks and standard operating procedures.
- Evaluate and recommend new security technologies and solutions.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- A minimum of 7 years of progressive experience in cybersecurity, with a focus on threat analysis, incident response, or security operations.
- Proven expertise in analyzing various types of cyber threats, including malware, phishing, and advanced persistent threats (APTs).
- Hands-on experience with SIEM platforms (e.g., Splunk, QRadar), IDS/IPS, EDR solutions, and threat intelligence platforms (TIPs).
- Strong understanding of network protocols, operating systems (Windows, Linux), and common attack vectors.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and analysis is a strong advantage.
- Excellent analytical, problem-solving, and critical thinking skills.
- Exceptional written and verbal communication skills, with the ability to articulate complex technical information clearly.
- Ability to work independently, prioritize tasks, and manage time effectively in a remote environment.
- Relevant cybersecurity certifications such as CISSP, GCTI, CEH, or SANS GIAC are highly desirable.
- Experience with cloud security (AWS, Azure, GCP) is a plus.
Senior Cybersecurity Analyst - Remote Threat Intelligence Lead
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Proactively hunt for threats within complex network environments using advanced detection and analysis techniques.
- Analyze vast amounts of security data from various sources (logs, network traffic, endpoint data) to identify malicious activity.
- Develop and maintain threat intelligence feeds and indicators of compromise (IOCs).
- Investigate security incidents, perform root cause analysis, and recommend remediation strategies.
- Utilize security tools and technologies, including SIEM, IDS/IPS, EDR, and threat intelligence platforms.
- Develop and refine security playbooks and standard operating procedures for incident response.
- Conduct vulnerability assessments and penetration testing to identify and prioritize security weaknesses.
- Stay current with the latest cyber threats, attack vectors, and defensive techniques.
- Collaborate with cross-functional teams to implement security enhancements and best practices.
- Provide technical expertise and guidance on cybersecurity matters to internal stakeholders.
- Develop detailed reports on security incidents, threat landscapes, and system vulnerabilities.
- Contribute to the continuous improvement of the security monitoring and incident response capabilities.
- Participate in on-call rotation as needed for critical security incidents.
- Bachelor's or Master's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 6 years of experience in cybersecurity, with a strong focus on threat analysis and incident response.
- In-depth knowledge of common attack vectors, malware analysis, and intrusion detection techniques.
- Hands-on experience with SIEM platforms (e.g., Splunk, QRadar, LogRhythm) and other security tools.
- Familiarity with scripting languages (e.g., Python, PowerShell) for security automation.
- Strong understanding of network protocols, operating systems, and security principles.
- Excellent analytical, problem-solving, and critical thinking skills.
- Ability to work independently and manage multiple priorities in a high-pressure, remote environment.
- Strong written and verbal communication skills, with the ability to articulate complex technical issues clearly.
- Relevant certifications such as CISSP, GIAC (GCIA, GCIH), or OSCP are highly desirable.
Lead Cybersecurity Threat Intelligence Analyst (Remote)
Posted 15 days ago
Job Viewed
Job Description
Be The First To Know
About the latest Remote cybersecurity analyst threat intelligence Jobs in Kenya !
Senior Cybersecurity Threat Intelligence Analyst (Remote)
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Collect, analyze, and interpret large volumes of threat data from various sources, including open-source intelligence (OSINT), dark web monitoring, security feeds, and internal incident data.
- Develop and maintain a comprehensive understanding of the current threat landscape, including major threat actors, their motivations, and their preferred TTPs.
- Produce high-quality, actionable threat intelligence reports tailored to different audiences, including technical teams, executive leadership, and business stakeholders.
- Conduct proactive threat hunting exercises to identify undetected malicious activity within the organization's networks and systems.
- Develop and refine threat models and attack vectors relevant to the organization's industry and technological environment.
- Monitor the effectiveness of existing security controls and recommend enhancements based on threat intelligence findings.
- Collaborate closely with incident response, security operations, and vulnerability management teams to provide contextual information and support during security incidents.
- Develop and manage relationships with external intelligence sharing communities and vendors.
- Create and maintain threat intelligence platforms and tools, ensuring data accuracy and accessibility.
- Advise on security best practices and recommend strategic improvements to prevent future attacks.
- Conduct deep-dive analysis of malware, phishing campaigns, and advanced persistent threats (APTs).
- Stay current with the latest cybersecurity threats, vulnerabilities, and defensive technologies.
- Mentor junior analysts and contribute to the development of the threat intelligence program.
- Prepare briefings and presentations on threat intelligence findings and recommendations.
- Automate intelligence gathering and analysis processes where possible.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Master's degree or relevant certifications (e.g., CISSP, GIAC, OSCP) are highly desirable.
- Minimum of 7 years of experience in cybersecurity, with a significant focus on threat intelligence, incident response, or malware analysis.
- Proven experience in collecting, analyzing, and disseminating actionable threat intelligence.
- Deep understanding of the cyber kill chain, MITRE ATT&CK framework, and various threat actor methodologies.
- Proficiency with threat intelligence platforms, SIEM tools, and data analysis techniques.
- Experience with scripting languages (e.g., Python) for automation and data manipulation is a strong plus.
- Excellent analytical, critical thinking, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to convey complex technical information clearly and concisely.
- Experience in threat hunting and adversary emulation.
- Familiarity with network protocols, operating systems, and cloud security concepts.
- Ability to work independently and collaboratively in a fully remote, fast-paced environment.
- Demonstrated ability to manage multiple priorities and meet tight deadlines.
- Experience in geopolitical threat analysis is a bonus.
Remote Senior Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze threat intelligence feeds, security alerts, and incident data to identify potential cyber threats and vulnerabilities.
- Develop and maintain threat models and profiles for relevant threat actors and their TTPs (Tactics, Techniques, and Procedures).
- Conduct in-depth research on emerging cybersecurity threats, malware, and attack vectors.
- Produce timely and actionable threat intelligence reports for various stakeholders, including executive leadership and technical teams.
- Collaborate with incident response teams to provide context and support during security investigations.
- Develop and implement strategies for the collection, enrichment, and dissemination of threat intelligence.
- Utilize a variety of security tools and technologies, including SIEM, IDS/IPS, EDR, and threat intelligence platforms.
- Participate in threat hunting activities to proactively identify and neutralize potential threats within the network.
- Stay abreast of the latest cybersecurity trends, vulnerabilities, and attack methodologies.
- Contribute to the development and improvement of security policies and procedures.
- Provide guidance and mentorship to junior cybersecurity analysts.
- Communicate complex technical information clearly and concisely to both technical and non-technical audiences.
- Participate in security awareness training and outreach programs.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Master's degree preferred.
- Minimum of 5 years of progressive experience in cybersecurity, with a significant focus on threat intelligence analysis.
- Demonstrated experience with threat intelligence platforms, SIEM tools, and other security monitoring solutions.
- Strong understanding of network security principles, operating systems (Windows, Linux), and common attack vectors.
- Proficiency in scripting languages (e.g., Python) for automating analysis and data processing.
- Experience with malware analysis techniques and tools.
- Excellent analytical, research, and problem-solving skills.
- Superior written and verbal communication skills, with the ability to produce high-quality intelligence reports.
- Ability to work independently, manage time effectively, and collaborate seamlessly within a remote team environment.
- Relevant cybersecurity certifications (e.g., CISSP, GCIH, GCFA) are highly desirable.
This is a critical role for maintaining our client's security posture, offering a challenging and rewarding career in a fully remote setting.
Senior Cybersecurity Analyst - Threat Intelligence (Remote)
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze the global threat landscape for emerging cyber threats and vulnerabilities.
- Research and investigate threat actor TTPs, motivations, and infrastructure.
- Develop and maintain threat intelligence feeds and indicators of compromise (IOCs).
- Correlate data from various sources (OSINT, commercial feeds, internal logs) to identify threats.
- Produce actionable threat intelligence reports for technical and executive audiences.
- Collaborate with Security Operations Center (SOC) and Incident Response teams to integrate intelligence.
- Develop threat models and scenarios to assess organizational risk.
- Contribute to the development and refinement of threat hunting methodologies.
- Stay abreast of the latest cybersecurity trends, tools, and techniques.
- Participate in cybersecurity communities and information sharing groups.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 6 years of experience in cybersecurity, with a strong focus on threat intelligence or security analysis.
- In-depth knowledge of cyber threat actors, TTPs, and attack vectors.
- Experience with threat intelligence platforms (TIPs) and SIEM solutions (e.g., Splunk, QRadar).
- Proficiency in data analysis, malware analysis, and network forensics.
- Strong research and analytical skills with the ability to interpret complex data.
- Excellent written and verbal communication skills, with the ability to produce clear reports.
- Ability to work independently and manage priorities effectively in a remote setting.
- Relevant certifications such as CISSP, CEH, GIAC are a plus.
- Understanding of geopolitical factors influencing cyber threats is beneficial.