Job Search and Career Advice Platform

Enable job alerts via email!

Manager - Threat Intelligence

Halian

Abu Dhabi

Remote

AED 60,000 - AED 120,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm is seeking a Manager – Threat Intelligence to lead a team of skilled analysts. The role involves ensuring timely and actionable threat intelligence for clients, managing quality reports, and continuously improving threat intelligence processes. The ideal candidate will have strong leadership, communication, and problem-solving skills, along with experience in the cybersecurity field. This position is essential for maintaining high standards of client service and operational excellence.

Qualifications

  • Ability to work well in a fast-paced environment.
  • Experience leading high-value threat intelligence teams.
  • Strong interpersonal skills for client interaction.

Responsibilities

  • Lead a team to collect and analyze threat intelligence.
  • Ensure quality and timeliness of team reports.
  • Manage development of threat intelligence processes.

Skills

Team leadership
Verbal and written communication
Problem-solving
Threat intelligence analysis
Job description
Job Title

Manager – Threat Intelligence

Business Unit

Cyber Defense Reporting to Director – Threat Intelligence

Unit

Cyber Resilience Services_Remote Monitoring-Threat Intelligence Grade 13

Job Purpose

The Threat Intelligence Manager is an integral part of the Threat Intelligence Center. As the Threat Intelligence Manager, you will be leading a team of highly skilled Cyber Threat Intelligence Analysts to ensure that cyber threat intelligence is properly collected, analyzed, and disseminated. You will be a natural leader along with drive and ambition to ensure intelligence operations are delivered efficiently and effectively.

Job Responsibilities

Key Focus Areas

Key Activities
  • Lead a team of threat intelligence analysts to collect, analyze and distribute relevant and actionable threat intelligence to clients.
  • Responsible for the quality and timeliness of the team’s reports, briefs, presentations, findings and recommendations including executive level threat reporting.
  • Responsible for measuring and reporting on CTI value and customer satisfaction.
  • Lead the development, management, optimization and continuous improvement of processes to enhance the overall cyber threat intelligence function.
  • Lead and contribute practically in key projects.
  • Prepare intelligence products, including high-quality reports, assessments, briefings, recommendations, and findings.
  • Establish and maintain relationships with public and private intelligence community members.

Resource

Management People: Interfaces with clients and SOC personnel to ensure that timely, relevant and actionable threat intelligence is communicated. High quality service is provided.

Nature of Interaction

  • Internal: Point of Contact for Threat Intelligence Requests.
  • External: Clients for threat intelligence reach back tasks.

Problem Solving

Exceptional problem‑solving skills. Uses previous experience to identify the most appropriate option or to adapt or improve existing approaches. Resolves issues which are varied and non‑routine.

AOR (Any Other Responsibilities) Any other responsibilities as required by the Line Manager.

Job Specifications
Skills/Certifications
  • Ability to work well with others in a fast‑paced dynamic environment.
  • Excellent verbal and written communication skills with strong interpersonal, facilitation & communication skills.
  • Previous experience leading cost‑effective, high‑value threat intelligence teams.
  • Experience in analyzing, gathering intelligence on, developing, and documenting threat group activities.
Integrated Management System (IMS) requirements
  • Compliance: Ensure compliance with applicable laws, regulations, and company IMS policies.
  • Acceptable Use of Assets: Ensure compliance with the Acceptable Usage Policy, Company Code of Conduct and Non‑Disclosure Agreements while dealing with any company and/or client information asset(s).
  • Data Protection: Always protect company and customer’s sensitive information from unauthorized access, disclosure, alteration, or destruction.
  • IMS Awareness: Participate in information security, business continuity, privacy and IT training and awareness sessions.
  • Reporting: Report any identified information security, business continuity and data privacy related incident(s), risk(s) and weakness(es) in the technology, processes and daily operations immediately to the CISO (Chief Information Security Officer) Team.
  • Exercising and Testing: Participate and assist, wherever required, in risk assessment activities, incident simulations, fire drills and business continuity exercises, as and when required.
  • Secure Remote Work: Follow guidelines and procedures for secure remote work, including secure access, data protection, and adherence to relevant company policies and procedures.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.