1,140 Senior Cybersecurity Threat Analyst Remote jobs in Kenya
Cybersecurity Threat Analyst (Remote)
Posted 20 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze security alerts from various sources, including SIEM, IDS/IPS, and endpoint detection tools.
- Investigate and triage potential security incidents, performing in-depth forensic analysis when necessary.
- Identify emerging cybersecurity threats, vulnerabilities, and attack trends relevant to the organization.
- Develop and implement proactive threat hunting methodologies.
- Create and maintain documentation for security policies, procedures, and incident response plans.
- Collaborate with IT and security teams to implement and enhance security controls.
- Provide timely and accurate reporting on security incidents and threat intelligence to management.
- Stay up-to-date with the latest cybersecurity technologies, best practices, and industry regulations.
- Participate in security awareness training initiatives for employees.
- Contribute to the continuous improvement of the security operations center's capabilities.
This remote opportunity is perfect for a cybersecurity professional who is passionate about protecting systems and data from malicious actors. The ability to work independently, manage critical situations calmly, and communicate complex technical information clearly is paramount. If you possess strong investigative skills, a comprehensive knowledge of network security, and a drive to stay ahead of evolving cyber threats, we encourage you to apply and become an integral part of our client's robust security framework.
Lead Cybersecurity Threat Analyst (Remote)
Posted 9 days ago
Job Viewed
Job Description
Responsibilities:
- Lead the threat intelligence gathering, analysis, and dissemination process.
- Develop and implement advanced threat detection and hunting methodologies.
- Analyze and interpret security alerts, logs, and network traffic for suspicious activities.
- Conduct in-depth investigations of security incidents, including root cause analysis and impact assessment.
- Develop and refine incident response playbooks and procedures.
- Provide technical leadership and mentorship to a team of cybersecurity analysts.
- Collaborate with IT and security teams to implement security controls and remediation efforts.
- Stay current with the latest threat actors, attack vectors, vulnerabilities, and cybersecurity trends.
- Develop and maintain threat models and risk assessments for the organization.
- Author clear and concise reports on threat landscape, incident findings, and recommendations for management.
- Utilize SIEM, EDR, SOAR, and other security tools for effective monitoring and response.
- Represent the security team in cross-functional meetings and discussions.
- Contribute to the continuous improvement of security operations processes and technologies.
- Manage and prioritize multiple ongoing investigations and projects.
- Bachelor's or Master's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity, with a significant focus on threat analysis, incident response, or security operations.
- Proven experience leading a security analysis team.
- In-depth knowledge of various attack vectors, TTPs (Tactics, Techniques, and Procedures), and threat intelligence frameworks (e.g., MITRE ATT&CK).
- Expertise in utilizing SIEM platforms (e.g., Splunk, QRadar), EDR solutions, and network security monitoring tools.
- Experience with malware analysis (static and dynamic) and reverse engineering techniques is highly desirable.
- Strong understanding of networking protocols, operating systems (Windows, Linux), and cloud security concepts (AWS, Azure, GCP).
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to articulate technical concepts to diverse audiences.
- Ability to work independently, manage priorities effectively, and thrive in a fast-paced remote environment.
- Relevant certifications such as CISSP, GCTI, GCFA, CEH, or OSCP are a strong advantage.
- Must have a secure and reliable home office setup with high-speed internet.
Senior Cybersecurity Threat Analyst (Remote)
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and events from various sources, including SIEM, IDS/IPS, firewalls, and endpoint detection solutions.
- Analyze and investigate potential security incidents, determining scope, impact, and root cause.
- Develop and maintain threat intelligence feeds and reports, providing actionable insights to the security team and stakeholders.
- Conduct advanced threat hunting activities to proactively identify and neutralize malicious activities.
- Perform malware analysis and reverse engineering to understand attack vectors and develop countermeasures.
- Develop and refine incident response playbooks and procedures.
- Lead and coordinate incident response efforts during critical security events.
- Stay abreast of the latest cybersecurity threats, vulnerabilities, and attack techniques.
- Collaborate with IT and system administrators to implement security enhancements and remediation measures.
- Participate in security awareness training development and delivery.
- Contribute to the continuous improvement of security monitoring tools and processes.
- Document security incidents, findings, and recommendations thoroughly.
- Mentor junior security analysts and share knowledge within the team.
- Conduct vulnerability assessments and penetration testing support.
- Represent the security team in cross-functional projects as needed.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity, with a focus on threat analysis, incident response, or security operations.
- In-depth knowledge of cybersecurity principles, attack methodologies, and threat landscapes.
- Hands-on experience with SIEM tools (e.g., Splunk, QRadar), IDS/IPS, EDR solutions, and network security monitoring.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and analysis.
- Experience with malware analysis tools and techniques.
- Strong understanding of network protocols, operating systems (Windows, Linux), and cloud security.
- Excellent analytical, problem-solving, and critical-thinking skills.
- Exceptional written and verbal communication skills, with the ability to articulate technical details to diverse audiences.
- Relevant certifications such as CISSP, GCIH, CEH, or OSCP are highly desirable.
- Ability to work independently and effectively manage tasks in a remote setting.
- Experience with threat intelligence platforms and frameworks.
- Familiarity with the cybersecurity landscape in Mombasa, Mombasa, KE and its specific challenges is a plus.
Lead Cybersecurity Threat Intelligence Analyst (Remote)
Posted 15 days ago
Job Viewed
Job Description
Senior Cybersecurity Threat Intelligence Analyst (Remote)
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Collect, analyze, and interpret large volumes of threat data from various sources, including open-source intelligence (OSINT), dark web monitoring, security feeds, and internal incident data.
- Develop and maintain a comprehensive understanding of the current threat landscape, including major threat actors, their motivations, and their preferred TTPs.
- Produce high-quality, actionable threat intelligence reports tailored to different audiences, including technical teams, executive leadership, and business stakeholders.
- Conduct proactive threat hunting exercises to identify undetected malicious activity within the organization's networks and systems.
- Develop and refine threat models and attack vectors relevant to the organization's industry and technological environment.
- Monitor the effectiveness of existing security controls and recommend enhancements based on threat intelligence findings.
- Collaborate closely with incident response, security operations, and vulnerability management teams to provide contextual information and support during security incidents.
- Develop and manage relationships with external intelligence sharing communities and vendors.
- Create and maintain threat intelligence platforms and tools, ensuring data accuracy and accessibility.
- Advise on security best practices and recommend strategic improvements to prevent future attacks.
- Conduct deep-dive analysis of malware, phishing campaigns, and advanced persistent threats (APTs).
- Stay current with the latest cybersecurity threats, vulnerabilities, and defensive technologies.
- Mentor junior analysts and contribute to the development of the threat intelligence program.
- Prepare briefings and presentations on threat intelligence findings and recommendations.
- Automate intelligence gathering and analysis processes where possible.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Master's degree or relevant certifications (e.g., CISSP, GIAC, OSCP) are highly desirable.
- Minimum of 7 years of experience in cybersecurity, with a significant focus on threat intelligence, incident response, or malware analysis.
- Proven experience in collecting, analyzing, and disseminating actionable threat intelligence.
- Deep understanding of the cyber kill chain, MITRE ATT&CK framework, and various threat actor methodologies.
- Proficiency with threat intelligence platforms, SIEM tools, and data analysis techniques.
- Experience with scripting languages (e.g., Python) for automation and data manipulation is a strong plus.
- Excellent analytical, critical thinking, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to convey complex technical information clearly and concisely.
- Experience in threat hunting and adversary emulation.
- Familiarity with network protocols, operating systems, and cloud security concepts.
- Ability to work independently and collaboratively in a fully remote, fast-paced environment.
- Demonstrated ability to manage multiple priorities and meet tight deadlines.
- Experience in geopolitical threat analysis is a bonus.
Senior Cybersecurity Analyst - Threat Intelligence (Remote)
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze the global threat landscape for emerging cyber threats and vulnerabilities.
- Research and investigate threat actor TTPs, motivations, and infrastructure.
- Develop and maintain threat intelligence feeds and indicators of compromise (IOCs).
- Correlate data from various sources (OSINT, commercial feeds, internal logs) to identify threats.
- Produce actionable threat intelligence reports for technical and executive audiences.
- Collaborate with Security Operations Center (SOC) and Incident Response teams to integrate intelligence.
- Develop threat models and scenarios to assess organizational risk.
- Contribute to the development and refinement of threat hunting methodologies.
- Stay abreast of the latest cybersecurity trends, tools, and techniques.
- Participate in cybersecurity communities and information sharing groups.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 6 years of experience in cybersecurity, with a strong focus on threat intelligence or security analysis.
- In-depth knowledge of cyber threat actors, TTPs, and attack vectors.
- Experience with threat intelligence platforms (TIPs) and SIEM solutions (e.g., Splunk, QRadar).
- Proficiency in data analysis, malware analysis, and network forensics.
- Strong research and analytical skills with the ability to interpret complex data.
- Excellent written and verbal communication skills, with the ability to produce clear reports.
- Ability to work independently and manage priorities effectively in a remote setting.
- Relevant certifications such as CISSP, CEH, GIAC are a plus.
- Understanding of geopolitical factors influencing cyber threats is beneficial.
Lead Cybersecurity Analyst - Remote Threat Detection
Posted 12 days ago
Job Viewed
Job Description
Be The First To Know
About the latest Senior cybersecurity threat analyst remote Jobs in Kenya !
Senior Cybersecurity Analyst - Remote Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze security events and alerts from various security tools (SIEM, IDS/IPS, EDR).
- Investigate security incidents, perform root cause analysis, and develop containment strategies.
- Conduct advanced threat hunting activities to proactively identify and neutralize emerging threats.
- Research, analyze, and report on global cyber threats, actors, and tactics, techniques, and procedures (TTPs).
- Develop and maintain threat intelligence feeds and knowledge bases.
- Create comprehensive threat intelligence reports and briefings for technical and executive audiences.
- Provide expert recommendations for improving security controls, detection capabilities, and incident response processes.
- Collaborate with incident response teams to provide real-time threat context during active investigations.
- Stay abreast of the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
- Participate in security awareness training and knowledge sharing initiatives.
- Develop and refine security playbooks and standard operating procedures.
- Evaluate and recommend new security technologies and solutions.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- A minimum of 7 years of progressive experience in cybersecurity, with a focus on threat analysis, incident response, or security operations.
- Proven expertise in analyzing various types of cyber threats, including malware, phishing, and advanced persistent threats (APTs).
- Hands-on experience with SIEM platforms (e.g., Splunk, QRadar), IDS/IPS, EDR solutions, and threat intelligence platforms (TIPs).
- Strong understanding of network protocols, operating systems (Windows, Linux), and common attack vectors.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and analysis is a strong advantage.
- Excellent analytical, problem-solving, and critical thinking skills.
- Exceptional written and verbal communication skills, with the ability to articulate complex technical information clearly.
- Ability to work independently, prioritize tasks, and manage time effectively in a remote environment.
- Relevant cybersecurity certifications such as CISSP, GCTI, CEH, or SANS GIAC are highly desirable.
- Experience with cloud security (AWS, Azure, GCP) is a plus.
Remote Cybersecurity Threat Analyst
Posted 18 days ago
Job Viewed
Job Description
Senior Cybersecurity Analyst - Remote Threat Detection
Posted 11 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events from various sources (SIEM, IDS/IPS, EDR, etc.) to identify potential security incidents.
- Conduct in-depth analysis of security threats, vulnerabilities, and attack vectors.
- Perform digital forensics investigations to determine the root cause and scope of security incidents.
- Develop and implement incident response plans and procedures.
- Lead and coordinate incident response efforts, including containment, eradication, and recovery.
- Proactively hunt for threats within the network and systems.
- Research and stay current with emerging cybersecurity threats, trends, and technologies.
- Develop and maintain security tools, scripts, and automation for threat detection and response.
- Contribute to the development and enhancement of security policies and best practices.
- Provide security awareness training and guidance to internal teams.
- Collaborate with IT and other departments to ensure security is integrated into all aspects of the organization.
- Prepare detailed reports on security incidents, findings, and recommendations.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Master's degree preferred.
- Minimum of 7 years of experience in cybersecurity, with a strong focus on security operations, threat intelligence, and incident response.
- In-depth knowledge of various attack techniques, malware analysis, and forensic investigation methodologies.
- Proficiency with SIEM tools (e.g., Splunk, QRadar), EDR solutions, and network security monitoring tools.
- Experience with scripting languages (e.g., Python, PowerShell) for automation.
- Understanding of network protocols, operating systems (Windows, Linux), and cloud security principles.
- Relevant certifications such as CISSP, GIAC (GSEC, GCIH, GCFA), or CEH are highly desirable.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to clearly articulate technical findings.
- Proven ability to work independently and effectively in a remote, fast-paced environment.