375 Remote Cybersecurity Threat Analyst jobs in Kenya
Remote Cybersecurity Threat Analyst
Posted 20 days ago
Job Viewed
Job Description
Senior Remote Cybersecurity Threat Analyst
Posted 10 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security information and event management (SIEM) systems and other security tools for potential threats and anomalies.
- Analyze threat intelligence feeds and security advisories to stay ahead of emerging cyber risks.
- Conduct in-depth investigations into security incidents, including malware analysis, intrusion detection, and forensic analysis.
- Develop and refine threat detection rules, signatures, and behavioral analytics.
- Create detailed incident reports, documenting findings, impact, and recommended remediation steps.
- Collaborate with incident response teams to contain and eradicate threats.
- Develop and maintain threat models and attack scenarios relevant to our client's environment.
- Provide guidance and recommendations to improve security controls and processes.
- Contribute to the development and maintenance of security playbooks and standard operating procedures.
- Mentor junior security analysts and share knowledge within the cybersecurity team.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity operations, threat analysis, or incident response.
- In-depth knowledge of common cyber threats, attack vectors, and mitigation techniques.
- Proficiency with SIEM tools (e.g., Splunk, QRadar), IDS/IPS, EDR, and other security technologies.
- Strong understanding of network protocols, operating systems, and cloud security.
- Experience with scripting languages (e.g., Python, PowerShell) for automation is a plus.
- Relevant cybersecurity certifications (e.g., CISSP, GIAC, OSCP) are highly desirable.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to document complex technical details.
Lead Information Security Analyst (Cyber Threat Intelligence)
Posted 10 days ago
Job Viewed
Job Description
Key Responsibilities:
- Develop, manage, and mature the organization's Cyber Threat Intelligence program.
- Monitor, collect, and analyze threat data from various sources, including open-source intelligence (OSINT), dark web forums, threat feeds, and internal security telemetry.
- Identify and track advanced persistent threats (APTs), malware campaigns, and other cyber adversary activities relevant to the organization's sector.
- Produce timely and actionable threat intelligence reports, briefings, and alerts for stakeholders, including executive leadership, security operations, and incident response teams.
- Develop and maintain threat actor profiles, including their TTPs (Tactics, Techniques, and Procedures).
- Design and implement threat hunting methodologies based on intelligence findings.
- Collaborate with security operations (SecOps) and incident response (IR) teams to provide context and support during security incidents.
- Build and maintain relationships with external threat intelligence providers and peer organizations.
- Develop and implement metrics to measure the effectiveness of the CTI program.
- Stay abreast of the latest cybersecurity trends, vulnerabilities, and attack vectors.
- Provide subject matter expertise on threat intelligence to internal teams and management.
Qualifications:
- Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent practical experience.
- Minimum of 8 years of experience in information security, with at least 5 years focused on cyber threat intelligence.
- Demonstrated experience in developing and leading CTI programs.
- In-depth knowledge of threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
- Proficiency in utilizing various intelligence gathering tools and platforms (e.g., MISP, SIEM, TIPs).
- Strong analytical and investigative skills with the ability to synthesize complex information into clear, concise intelligence.
- Excellent written and verbal communication skills, with the ability to present technical information to diverse audiences.
- Experience with scripting languages (e.g., Python) for automation of intelligence collection and analysis is highly desirable.
- Relevant certifications such as GIAC Certified Threat Intelligence (GCTI) or equivalent are a plus.
- Proven ability to work independently and collaboratively in a remote environment.
- Understanding of geopolitical factors influencing cyber threats.
Location: Machakos, Machakos, KE (Remote)
Senior Information Security Analyst (Cyber Threat Intelligence)
Posted 15 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze threat intelligence feeds, security alerts, and incident data from various sources.
- Identify, track, and attribute threat actors and their tactics, techniques, and procedures (TTPs).
- Develop actionable intelligence reports and briefings for security leadership and operational teams.
- Conduct in-depth research on emerging threats, vulnerabilities, and attack trends.
- Support incident response activities by providing timely and relevant threat context.
- Develop and maintain threat models and profiles for the organization.
- Contribute to the enhancement of security monitoring and detection capabilities based on intelligence findings.
- Collaborate with internal security teams (SOC, IR, Vulnerability Management) to operationalize threat intelligence.
- Develop and implement intelligence requirements and collection plans.
- Build and maintain relationships with external threat intelligence communities and information sharing groups.
- Utilize threat intelligence platforms and analytical tools effectively.
- Provide expert analysis and recommendations on security posture improvements.
- Stay current with geopolitical events and their impact on the cyber threat landscape.
- Contribute to the development of security awareness training based on intelligence insights.
- Document intelligence processes, methodologies, and findings.
Required Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, or a related field. Relevant certifications (e.g., CISSP, GIAC) are a plus.
- 5+ years of experience in information security, with a specialization in cyber threat intelligence.
- Demonstrated experience in collecting, analyzing, and disseminating threat intelligence.
- In-depth knowledge of threat actor TTPs, malware analysis, and cyber attack methodologies.
- Familiarity with threat intelligence platforms, OSINT techniques, and data analysis tools.
- Strong understanding of network security, endpoint security, and cloud security concepts.
- Excellent analytical, research, and written and verbal communication skills.
- Ability to work independently and collaboratively in a remote, fast-paced environment.
Remote Information Security Analyst (Cyber Threat Intelligence)
Posted 20 days ago
Job Viewed
Job Description
- Monitoring open-source intelligence (OSINT), dark web forums, and other sources for emerging cyber threats.
- Analyzing threat actor tactics, techniques, and procedures (TTPs).
- Developing and disseminating timely threat intelligence reports to relevant stakeholders.
- Identifying vulnerabilities and potential attack vectors targeting the organization.
- Collaborating with incident response teams to support investigations and remediation efforts.
- Recommending security controls and best practices to mitigate identified risks.
- Assisting in the development and maintenance of threat intelligence platforms and tools.
- Conducting threat hunting activities to uncover potential compromises.
- Staying current with the latest cybersecurity trends, vulnerabilities, and exploits.
- Contributing to the overall security awareness and training programs.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 4 years of experience in information security, with a specialization in threat intelligence or security operations.
- Strong understanding of common cyber threats, attack vectors, and defense mechanisms.
- Proficiency in using threat intelligence tools and platforms (e.g., MISP, Recorded Future, Shodan).
- Experience with SIEM (Security Information and Event Management) systems.
- Excellent analytical, research, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to produce clear and concise threat reports.
- Ability to work independently, manage multiple research streams, and meet deadlines in a remote environment.
- Relevant certifications such as GIAC (GCTI, GCFA), CompTIA Security+, or CISSP are highly desirable.
- Familiarity with scripting languages (e.g., Python) for data analysis is a plus.
Remote Cybersecurity Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
Remote Cybersecurity Analyst - Threat Detection
Posted 20 days ago
Job Viewed
Job Description
Be The First To Know
About the latest Remote cybersecurity threat analyst Jobs in Kenya !
Remote Cybersecurity Threat Intelligence Analyst
Posted 20 days ago
Job Viewed
Job Description
Remote Cybersecurity Analyst - Threat Detection and Response
Posted 2 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events from various sources, including SIEM, IDS/IPS, and EDR solutions.
- Analyze security incidents to identify root causes, scope of impact, and containment strategies.
- Conduct forensic investigations to gather evidence and support incident response efforts.
- Perform vulnerability assessments and penetration testing to identify system weaknesses.
- Develop and implement security protocols and best practices to prevent future incidents.
- Stay current with emerging cybersecurity threats, vulnerabilities, and attack techniques.
- Collaborate with IT teams to implement security patches and configurations.
- Create and maintain incident response plans and documentation.
- Provide technical guidance and support to other teams on cybersecurity matters.
- Contribute to the development and improvement of security monitoring tools and processes.
- Participate in security awareness training programs for employees.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 4 years of experience in cybersecurity analysis or incident response.
- Proficiency with SIEM, IDS/IPS, EDR, and other security monitoring tools.
- Strong understanding of network protocols, operating systems (Windows, Linux), and cybersecurity frameworks (e.g., NIST, ISO 27001).
- Experience with forensic analysis techniques and tools.
- Knowledge of common cyber threats, vulnerabilities, and attack vectors.
- Excellent analytical, problem-solving, and critical-thinking skills.
- Strong communication and collaboration skills, essential for remote work.
- Relevant certifications such as CISSP, CEH, CompTIA Security+ are highly desirable.
Remote Cybersecurity Analyst - Threat Detection & Response
Posted 9 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and logs from various security tools (e.g., SIEM, IDS/IPS, firewalls).
- Investigate security incidents, analyze root causes, and provide detailed incident reports.
- Develop and implement threat detection rules and signatures.
- Respond to security breaches and coordinate incident response activities.
- Conduct vulnerability assessments and penetration testing support.
- Stay current with emerging threats, vulnerabilities, and cybersecurity trends.
- Recommend and implement security enhancements to protect systems and data.
- Collaborate with IT and other departments to ensure security best practices are followed.
- Participate in security awareness training for employees.
- Contribute to the development and refinement of security policies and procedures.
Qualifications:
- Bachelor's degree in Computer Science, Information Security, or a related field; relevant certifications (e.g., CompTIA Security+, CEH, CISSP) are highly desirable.
- Minimum of 4 years of experience in cybersecurity analysis, incident response, or SOC operations.
- Proficiency with security information and event management (SIEM) systems.
- Strong understanding of network protocols, operating systems, and common attack vectors.
- Experience with intrusion detection/prevention systems, firewalls, and endpoint security solutions.
- Excellent analytical, problem-solving, and critical-thinking skills.
- Effective communication and documentation skills for incident reporting and collaboration.
- Ability to work independently and manage time effectively in a remote setting.
- Knowledge of threat intelligence platforms and security frameworks.
- Commitment to maintaining the highest level of confidentiality and integrity.