Skip links

Cyber threat intelligence Analyst

Cyber threat intelligence Analyst

Job description

The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.

The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.

The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.

Job Responsibilities

  • Help develop, configure and manage a suite of cyber threat intelligence sources
  • Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
  • Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
  • Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
  • Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
  • Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
  • Manage the complete IoC lifecycle
  • Providing analysis to feed into the overall security posture, assisting with supporting activities to further increase defences, harden potential attack surfaces and implement better protection mechanisms.
  • Act as CTI lead in the handling and remediation of security incidents.
  • Maintain strong awareness with stakeholder groups of current threat landscape
  • Review, analyse and contextualise complex threat intelligence data for wider consumption with business partners

What You’ll Need

Qualification Requirements (Desirable)

  • Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
  • Degree or equivalent (i.e. MBA) desirable but not essential
  • Comprehensive knowledge about vulnerability and security policies such as ISO standards

Skills / Experience Requirements

  • 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
  • Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
  • Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
  • Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
  • Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
  • Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
  • Knowledge of threat intelligence tooling, both commercial and open source.
  • Understanding of Security Operations and supporting functions, technologies and methodologies.
  • Ability to document findings into reports that can be understood across all levels of the organization.
  • Strong presentation and communication skills, both verbal and written.
  • Working knowledge of threat hunting

No of Positions: 1

Note: The candidate would be expected to work in diverse consulting engagements and are willing to travel to Middle East countries for project execution at least 50% of their time.

Preference to candidates who can join immediately or within 15 days at the max.

Employment Type : Full-time

Job Category: CTI Information Security
Job Type: Full Time
Job Location: KSA MENA Qatar

Apply for this position

Allowed Type(s): .pdf, .doc, .docx