469 Senior Remote Information Security Analyst Threat Intelligence jobs in Kenya
Remote Information Security Analyst - Threat Intelligence
Posted 22 days ago
Job Viewed
Job Description
Senior Remote Information Security Analyst (Threat Intelligence)
Posted 6 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor, collect, and analyze threat intelligence from various sources, including open-source, commercial feeds, and government agencies.
- Identify and track threat actors, their motivations, capabilities, and tactics, techniques, and procedures (TTPs).
- Develop and maintain threat models to understand potential attack paths against the organization.
- Produce timely and actionable threat intelligence reports for various stakeholders, including SOC, Incident Response, and executive management.
- Provide strategic and tactical recommendations to improve the organization's security posture based on threat intelligence.
- Contribute to the development and enhancement of threat intelligence platforms and processes.
- Collaborate with incident response teams to provide context and support during security investigations.
- Develop indicators of compromise (IOCs) and indicators of attack (IOAs) for detection and prevention.
- Conduct proactive threat hunting based on intelligence insights.
- Stay current with emerging cybersecurity threats, trends, and technologies.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field; relevant certifications (e.g., GIAC, CISSP) are highly desirable.
- Minimum of 5 years of experience in information security, with a significant focus on threat intelligence.
- Proven experience with threat intelligence platforms, SIEM tools, and data analysis techniques.
- Strong understanding of cyber threat actors, malware analysis, and attack methodologies.
- Proficiency in OSINT gathering and analysis.
- Excellent analytical, research, and critical thinking skills.
- Exceptional written and verbal communication skills, with the ability to present complex information clearly.
- Ability to work independently and effectively in a remote, collaborative environment.
- Familiarity with programming/scripting languages (e.g., Python) for automation is a plus.
- Knowledge of network protocols and security architectures.
This fully remote position allows you to contribute to strengthening the cybersecurity landscape of organizations that may have operations or interests in regions such as Embu, Embu, KE .
Information Security Threat Intelligence Analyst
Posted 22 days ago
Job Viewed
Job Description
Key Responsibilities:
- Collect, analyze, and interpret threat intelligence data from various internal and external sources (e.g., OSINT, commercial feeds, dark web monitoring, government agencies).
- Identify emerging threats, vulnerabilities, and attack trends relevant to our client's industry and technology stack.
- Develop and maintain profiles of threat actors, their motivations, capabilities, and tactics, techniques, and procedures (TTPs).
- Produce regular intelligence reports, briefings, and alerts for different audiences, including technical security teams and executive leadership.
- Integrate threat intelligence into security operations processes, such as SIEM correlation rules, IDS/IPS signatures, and threat hunting playbooks.
- Collaborate with incident response teams to provide context and support during active security incidents.
- Build and maintain relationships with external threat intelligence sharing communities and partners.
- Evaluate and recommend new threat intelligence tools and technologies.
- Conduct research on specific threats, malware, and attacker groups as needed.
- Contribute to the development of strategic security recommendations based on threat landscape analysis.
- Ensure the timely dissemination of critical threat information to relevant stakeholders.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, International Relations, or a related field, or equivalent professional experience.
- 3-5 years of experience in threat intelligence, cybersecurity analysis, or a related field.
- Demonstrated ability to analyze large datasets and extract meaningful intelligence.
- Strong understanding of cyber threat actor methodologies, malware analysis, and digital forensics.
- Familiarity with OSINT gathering techniques and tools.
- Excellent written and verbal communication skills, with the ability to present complex information clearly.
- Proficiency in scripting languages (e.g., Python) for data analysis and automation is a plus.
- Experience with threat intelligence platforms (TIPs) is desirable.
- Ability to work independently and manage time effectively in a remote setting.
- Curiosity and a proactive mindset towards understanding the evolving threat landscape.
Senior Threat Intelligence Analyst - Information Security
Posted 6 days ago
Job Viewed
Job Description
Responsibilities:
- Conduct in-depth research and analysis of emerging cyber threats, vulnerabilities, and attacker tactics, techniques, and procedures (TTPs).
- Develop and maintain threat intelligence feeds, reports, and dashboards for consumption by security operations, incident response, and executive leadership.
- Monitor and analyze open-source intelligence (OSINT), dark web forums, and other relevant sources for threat indicators.
- Assess the impact of new threats and vulnerabilities on the organization's systems and data.
- Collaborate with incident response teams to provide timely and relevant intelligence during security events.
- Develop and refine threat hunting methodologies based on intelligence findings.
- Build and manage relationships with external threat intelligence communities and vendors.
- Create predictive threat models and provide strategic recommendations for security investments and improvements.
- Contribute to the development and maintenance of the organization's security awareness programs by providing threat landscape insights.
- Mentor junior analysts and share knowledge within the cybersecurity team.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Master's degree or relevant certifications (e.g., CISSP, GIAC) are highly desirable.
- Minimum of 6 years of experience in cybersecurity, with a specialization in threat intelligence, security operations, or incident response.
- Demonstrated expertise in analyzing various types of cyber threats, including malware, phishing, ransomware, and advanced persistent threats (APTs).
- Proficiency with threat intelligence platforms, SIEM tools, and data analysis techniques.
- Strong understanding of networking protocols, operating systems, and common security vulnerabilities.
- Experience with scripting languages (e.g., Python) for automation and data analysis is a significant advantage.
- Excellent analytical, problem-solving, and critical-thinking skills.
- Ability to communicate complex technical information clearly and concisely to both technical and non-technical audiences.
- Proven ability to work independently and collaboratively in a remote team environment.
- A strong ethical compass and commitment to maintaining confidentiality.
Lead Information Security Analyst - Remote Threat Intelligence Specialist
Posted 4 days ago
Job Viewed
Job Description
Senior Information Security Analyst - Remote Threat Intelligence Specialist
Posted 22 days ago
Job Viewed
Job Description
Information Security Analyst (Threat Intelligence)
Posted 6 days ago
Job Viewed
Job Description
Be The First To Know
About the latest Senior remote information security analyst threat intelligence Jobs in Kenya !
Principal Information Security Analyst - Threat Intelligence
Posted 1 day ago
Job Viewed
Job Description
Lead Information Security Analyst - Threat Intelligence
Posted 19 days ago
Job Viewed
Job Description
As the Lead Analyst, you will be responsible for developing and executing our threat intelligence program, monitoring security alerts, conducting in-depth investigations, and providing actionable insights to enhance our defensive posture. You will leverage cutting-edge security tools and techniques to stay ahead of evolving threat landscapes.
Key Responsibilities:
- Develop, implement, and manage the organization's threat intelligence program.
- Monitor and analyze security alerts from various sources (SIEM, IDS/IPS, EDR, threat feeds).
- Conduct in-depth investigations into security incidents and anomalies.
- Identify, track, and analyze emerging cyber threats, threat actors, and their tactics, techniques, and procedures (TTPs).
- Produce timely and actionable threat intelligence reports for various stakeholders, including technical teams and executive leadership.
- Develop and maintain threat models specific to the organization and its industry.
- Collaborate with incident response teams to provide context and support during security events.
- Recommend and implement security controls and enhancements based on threat intelligence findings.
- Stay current with the latest security threats, vulnerabilities, and defense strategies.
- Mentor junior security analysts and provide technical guidance.
- Participate in security architecture reviews and provide input on security best practices.
- Develop and maintain relationships with external threat intelligence sources and communities.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 6 years of experience in information security, with a strong focus on threat intelligence, security operations, or incident response.
- Proven experience in developing and executing threat intelligence programs.
- In-depth knowledge of cyber threat actors, TTPs, and attack vectors.
- Proficiency with security tools such as SIEM (e.g., Splunk, QRadar), IDS/IPS, EDR, and threat intelligence platforms.
- Strong analytical, research, and problem-solving skills.
- Excellent written and verbal communication skills, with the ability to present complex technical information clearly and concisely.
- Relevant certifications such as CISSP, GCTI, CySA+, or similar are highly desirable.
- Experience in vulnerability management and security architecture is a plus.
- Ability to work effectively in a hybrid environment, collaborating both in-person and remotely.
This is a challenging and rewarding opportunity to play a critical role in safeguarding our organization's information assets. Join our dedicated security team and make a significant impact.
Senior Information Security Analyst - Threat Intelligence
Posted 20 days ago
Job Viewed
Job Description
Responsibilities:
- Continuously monitor, analyze, and interpret threat intelligence data from various sources (open-source, commercial feeds, internal telemetry).
- Identify, track, and report on emerging cyber threats, campaigns, and threat actors relevant to our client's interests.
- Develop and maintain threat models, attack graphs, and indicators of compromise (IOCs).
- Conduct deep-dive analysis of malware, phishing campaigns, and other cyber threats.
- Provide timely and actionable threat intelligence reports and briefings to senior management, security operations, and incident response teams.
- Develop and automate threat intelligence collection, processing, and dissemination workflows.
- Collaborate with cross-functional teams to integrate threat intelligence into security controls, policies, and procedures.
- Participate in threat hunting exercises and support incident response investigations with relevant intelligence.
- Stay abreast of the latest security trends, vulnerabilities, and threat actor TTPs (Tactics, Techniques, and Procedures).
- Mentor junior analysts and contribute to the development of the overall threat intelligence program.
- Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent practical experience.
- 5+ years of experience in information security, with a significant focus on threat intelligence, analysis, or cybersecurity operations.
- Proficiency in utilizing threat intelligence platforms (TIPs), SIEM tools, and other security analytics tools.
- Strong understanding of networking protocols, operating systems (Windows, Linux, macOS), and cybersecurity frameworks.
- Experience with scripting languages (e.g., Python, PowerShell) for automation and data analysis.
- Excellent written and verbal communication skills, with the ability to present technical findings to diverse audiences.
- Certifications such as GCTI, CISSP, or equivalent are highly desirable.