Act as a key player in the cyber threat intelligence team, focusing on identifying, analyzing, and mitigating security risks and cyber incidents.
Research and investigate threat indicators, correlate security events, and identify malicious activities to proactively address a variety of cyber threats.
Monitor open-source intelligence (OSINT) feeds and track threat actor activities to identify attack patterns and emerging risks.
Identify and analyze OSINT threats pertinent to our customers' digital environments and generate actionable intelligence reports.
Conduct daily reviews, analyses, and refinement of OSINT and Social Media Intelligence (SOCMINT) to provide accurate threat assessments.
Investigate and profile malicious actors targeting client infrastructure, evaluating their tactics, techniques, and procedures (TTPs).
Deliver detailed intelligence reports on a weekly, monthly, quarterly, and annual basis for internal teams and leadership.
Prioritize and categorize threat intelligence data, ensuring the most relevant insights are acted upon swiftly.
Support Advanced Persistent Threat (APT) hunting, incident response activities, and complex analytics to fortify cyber defenses.
Review security logs and audit trails to detect suspicious or anomalous behaviors.
Develop intelligence briefs and summaries for various stakeholders to raise awareness and improve decision-making.
Collaborate across teams to strengthen organizational security postures and improve threat response processes.
Stay updated on geopolitical trends and their impact on the evolving cyber threat landscape.
Apply expertise with frameworks like the Cyber Kill Chain to enhance threat analysis workflows.
Use advanced Threat Intelligence Platforms (e.g., Recorded Future, Flashpoint, Blueliv, Anomali, ThreatIQ) to gather and analyze intelligence.
Leverage Digital Risk Management tools to monitor for dark web activities, breaches, and potential risks.
Maintain an organized repository of critical threat intelligence sources and data.
Engage with the dark web, forums, IRCs, and other channels to gather intelligence about emerging threats.
Curate and publish newsletters and social media updates summarizing key activities and trends in the cybersecurity space.
Qualifications
4+ years of experience in extracting, analyzing, and disseminating open-source intelligence (OSINT).
Regional expertise and understanding of threat actors and their behaviors.
Knowledge of predictive analysis methods and alternative intelligence analysis techniques.
Hands-on experience with investigative tools like Maltego, DomainTools, and VirusTotal.
Familiarity with methodologies for evaluating and scoring threats (e.g., Threat Rating Methodology).
Proficiency in working with Threat Intelligence Platforms (TIPs).
Active involvement in security and intelligence associations and communities.
Certifications
Certified Ethical Hacker (CEH)
SANS Certified Intrusion Analyst (GCIA)
SANS Certified Cyber Threat Intelligence (GCTI)
مستوى الأقدمية
مستوى متوسط الأقدمية
نوع التوظيف
دوام كامل
المهام الوظيفية
تكنولوجيا المعلومات
المجالات
الاستخدام والتوظيف
تزيد الترشيحات من فرصك في الوصول لمقابلة الوظيفة في شركة Keycruit، إلى الضعف