905 Senior Cybersecurity Threat Intelligence Analyst jobs in Kenya
Cybersecurity Threat Intelligence Analyst
Posted 19 days ago
Job Viewed
Job Description
Key responsibilities include monitoring threat landscapes, researching emerging threats, vulnerabilities, and attack vectors. You will develop and maintain threat intelligence reports, briefs, and alerts for different audiences, ranging from technical teams to executive leadership. This involves understanding adversary tactics, techniques, and procedures (TTPs) and their potential impact on our infrastructure. You will utilize various threat intelligence platforms, tools, and data feeds to enhance our defensive capabilities. Collaborating with internal security teams, including incident response and security engineering, to translate intelligence into effective security controls and response strategies will be paramount. Staying abreast of the latest cybersecurity trends, threat actor methodologies, and geopolitical factors influencing cyber threats is essential.
The ideal candidate will possess a strong understanding of cybersecurity principles, network security, and common attack methodologies. Experience with threat intelligence platforms, SIEM solutions, and data analysis tools is highly desirable. Excellent analytical and problem-solving skills, coupled with strong written and verbal communication abilities, are required. You should be able to articulate complex technical information clearly and concisely. A proactive mindset and a commitment to continuous learning in the ever-evolving field of cybersecurity are essential. This role requires a detail-oriented individual who can work independently and as part of a team, contributing to the overall security posture of the organization. Familiarity with industry-standard frameworks such as MITRE ATT&CK is a plus.
Lead Cybersecurity Threat Intelligence Analyst
Posted 21 days ago
Job Viewed
Job Description
Senior Cybersecurity Threat Intelligence Analyst
Posted 21 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze threat intelligence feeds, open-source intelligence (OSINT), and other relevant data sources to identify emerging threats and attack vectors.
- Develop and maintain profiles of threat actors, their motivations, and their typical TTPs.
- Conduct in-depth research into malware, exploits, and emerging cyber threats.
- Produce timely and actionable threat intelligence reports for various stakeholders, including security operations teams, incident response teams, and executive leadership.
- Develop and refine methodologies for threat hunting and proactive detection of advanced persistent threats (APTs).
- Collaborate with internal security teams to integrate threat intelligence into security controls, detection mechanisms, and incident response playbooks.
- Provide expert guidance on threat landscape trends and their implications for the organization.
- Contribute to the development and improvement of threat intelligence platforms and tools.
- Mentor junior analysts and contribute to the overall growth of the threat intelligence program.
- Stay current with the latest cybersecurity threats, vulnerabilities, and defensive strategies.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity, with at least 4 years focused on threat intelligence analysis.
- Deep understanding of threat actor methodologies, including the Cyber Kill Chain and MITRE ATT&CK framework.
- Proficiency in utilizing various threat intelligence platforms, SIEM tools, and data analysis techniques.
- Experience with OSINT gathering and analysis techniques.
- Strong understanding of network protocols, operating systems, and common cybersecurity vulnerabilities.
- Excellent analytical, critical thinking, and problem-solving skills.
- Exceptional written and verbal communication skills, with the ability to produce clear and concise intelligence reports.
- Proven ability to work independently and collaboratively in a 100% remote work environment.
- Relevant cybersecurity certifications (e.g., CISSP, GCTI, CEH) are highly desirable.
Remote Cybersecurity Threat Intelligence Analyst
Posted 21 days ago
Job Viewed
Job Description
Lead Cybersecurity Threat Intelligence Analyst (Remote)
Posted 16 days ago
Job Viewed
Job Description
Senior Cybersecurity Threat Intelligence Analyst - Remote
Posted 21 days ago
Job Viewed
Job Description
Responsibilities:
- Collect, analyze, and interpret threat intelligence data from various sources, including open-source intelligence (OSINT), dark web forums, security feeds, and internal logs.
- Identify emerging cyber threats, attack vectors, and threat actor methodologies.
- Develop and maintain threat actor profiles, including their tactics, techniques, and procedures (TTPs).
- Produce high-quality threat intelligence reports, summaries, and alerts for security operations, incident response, and executive leadership.
- Provide strategic and tactical intelligence to inform security control development, incident response strategies, and vulnerability management efforts.
- Develop and implement threat hunting methodologies to proactively uncover advanced persistent threats (APTs).
- Collaborate with internal security teams, including incident responders and security engineers, to share intelligence and coordinate defensive actions.
- Stay current with the latest cybersecurity trends, vulnerabilities, and geopolitical factors influencing the threat landscape.
- Evaluate and recommend new threat intelligence tools and technologies.
- Mentor junior analysts and contribute to the overall growth and effectiveness of the threat intelligence team.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 6 years of experience in cybersecurity, with at least 3 years focused on threat intelligence analysis.
- Deep understanding of cyber threats, attack methodologies, malware analysis, and incident response.
- Proficiency in using threat intelligence platforms (TIPs), SIEM tools, and data analysis tools.
- Experience with OSINT techniques and tools for intelligence gathering.
- Knowledge of various threat actor groups and their motivations.
- Excellent analytical, research, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to articulate complex technical information clearly and concisely.
- Ability to work independently and collaboratively in a fast-paced, remote environment.
- Relevant certifications such as GIAC Certified Intelligence Analyst (GCIA), GIAC Certified Intrusion Analyst (GCIA), or Certified Threat Intelligence Analyst (CTIA) are a plus.
Cybersecurity Analyst - Threat Intelligence
Posted 21 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze global threat intelligence feeds, OSINT, and dark web sources.
- Identify, track, and profile threat actors and their motivations.
- Analyze adversary TTPs and develop strategic defense recommendations.
- Produce detailed threat intelligence reports, briefings, and alerts.
- Collaborate with incident response, SOC, and engineering teams to operationalize intelligence.
- Develop and maintain threat models and assessments.
- Provide guidance on vulnerability management and proactive security measures.
- Stay abreast of emerging threats, vulnerabilities, and attack vectors.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent practical experience.
- Proven experience in threat intelligence, security analysis, or a related cybersecurity role.
- Strong understanding of threat actor methodologies, TTPs, and malware analysis.
- Proficiency in using threat intelligence platforms and tools (e.g., MISP, Anomali, Recorded Future).
- Experience with OSINT techniques and tools.
- Excellent analytical, critical thinking, and problem-solving skills.
- Exceptional written and verbal communication skills for reporting and presentations.
- Ability to work autonomously and manage time effectively in a remote setting.
- Relevant certifications (e.g., GCTI, CISSP, CEH) are a plus.
Be The First To Know
About the latest Senior cybersecurity threat intelligence analyst Jobs in Kenya !
Lead Cybersecurity Analyst - Threat Intelligence
Posted 21 days ago
Job Viewed
Job Description
Responsibilities:
- Develop and execute a comprehensive threat intelligence strategy, identifying and prioritizing key threats relevant to our industry and infrastructure.
- Lead a team of threat intelligence analysts, providing guidance, mentorship, and performance management.
- Conduct advanced threat research, analyzing malware, adversary tactics, techniques, and procedures (TTPs).
- Develop and maintain threat models, attack surfaces, and risk assessments.
- Integrate threat intelligence feeds and data sources into security tools and SIEM platforms.
- Develop and refine proactive threat hunting capabilities.
- Collaborate closely with incident response teams to provide timely and actionable intelligence during security events.
- Create detailed threat reports and executive summaries for stakeholders, including senior management.
- Automate intelligence gathering and analysis processes using scripting and programming languages.
- Stay current with geopolitical events, emerging threats, and cybersecurity trends.
- Contribute to the development of security policies and best practices.
- Mentor and train junior security personnel on threat intelligence principles.
- Foster strong relationships with external intelligence communities and law enforcement agencies.
- Manage and evaluate third-party threat intelligence providers.
- Champion a security-first culture throughout the organization.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Relevant certifications (e.g., CISSP, GIAC, CEH) are highly desirable.
- 5+ years of experience in cybersecurity, with at least 2 years specifically in threat intelligence or advanced persistent threat (APT) analysis.
- Demonstrated experience leading or mentoring a technical team.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and data analysis.
- Experience with SIEM tools (e.g., Splunk, QRadar), EDR solutions, and threat intelligence platforms (TIPs).
- Deep understanding of network protocols, operating systems, and common attack vectors.
- Experience with malware analysis (static and dynamic).
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to present technical information to both technical and non-technical audiences.
- Ability to work independently and manage multiple priorities in a fast-paced, remote environment.
- Familiarity with frameworks like MITRE ATT&CK is essential.
- Experience with cloud security (AWS, Azure, GCP) is a plus.
This position is a remote-first opportunity, allowing you to work from the comfort of your home office. You will be part of a globally distributed team, contributing to the security of our organization without geographical constraints. We are committed to fostering a collaborative and inclusive remote work environment. The position is based in Meru, Meru, KE , but requires a fully remote setup.
Remote Cybersecurity Analyst - Threat Intelligence
Posted 21 days ago
Job Viewed
Job Description
Senior Cybersecurity Analyst - Threat Intelligence
Posted 21 days ago
Job Viewed
Job Description
- Monitor, collect, and analyze threat intelligence from open-source, commercial, and internal sources.
- Identify emerging threats, vulnerabilities, and attacker campaigns relevant to the organization.
- Develop and maintain threat actor profiles and TTPs (Tactics, Techniques, and Procedures).
- Conduct threat hunting operations to proactively identify compromised systems or malicious activity.
- Produce timely and actionable threat intelligence reports, briefings, and alerts.
- Collaborate with Security Operations Center (SOC) and Incident Response (IR) teams to support investigations and remediation efforts.
- Develop and refine threat detection rules and signatures.
- Perform malware analysis to understand its behavior and indicators of compromise (IOCs).
- Provide subject matter expertise on threat intelligence to various stakeholders.
- Evaluate and recommend threat intelligence tools and platforms.
- Contribute to the development and improvement of the overall cybersecurity defense strategy.
- Stay current with the latest cybersecurity threats, vulnerabilities, and defense techniques.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field; Master's degree is a plus.
- Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence, incident response, or security analysis.
- Deep understanding of the current global threat landscape, including advanced persistent threats (APTs).
- Experience with various threat intelligence platforms and data feeds.
- Proficiency in analyzing security logs, network traffic, and forensic data.
- Knowledge of malware analysis techniques and tools.
- Experience with scripting languages (e.g., Python, PowerShell) for automation is highly desirable.
- Strong analytical, research, and critical thinking skills.
- Excellent written and verbal communication skills, including report writing and presentation abilities.
- Relevant certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), or Certified Threat Intelligence Analyst (CTIA) are a plus.
- Ability to work independently and collaboratively in a remote team environment.