Enable job alerts via email!

Threat Intelligence Analyst

Dautom

Dubai

On-site

AED 120,000 - 200,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player seeks a Cyber Security Specialist to enhance their threat intelligence and risk management efforts. In this role, you will proactively monitor for cyber threats, manage relationships with threat intelligence tools, and implement cutting-edge security technologies. Your expertise will be crucial in safeguarding the client's digital landscape against malicious activities. Join a dynamic team dedicated to innovation and quality, where your contributions will directly impact the security posture of a global leader. If you are passionate about cyber security and eager to tackle new challenges, this opportunity is perfect for you.

Qualifications

  • Expertise in cyber risk assessment and threat intelligence monitoring.
  • Experience with data access control technologies and incident response.

Responsibilities

  • Monitor for cyber threats and vulnerabilities to safeguard the client's environment.
  • Conduct threat hunting exercises and recommend mitigation tactics.

Skills

Cyber Risk Assessment
Threat Intelligence Monitoring
Data Access Control Technologies
Incident Response
Malicious Code Identification
Vulnerability Management

Tools

Threat Intelligence Tools

Job description

In this role, you will have the opportunity to work closely with one of our esteemed clients. This client is a global leader known for its commitment to quality and innovation. They have chosen Dautom as their trusted partner for their upcoming projects.

Job Description:

  • Provide cyber risk and threat identification by proactively and continuously monitoring the internal and external landscape for relevant events, risks and threats related to malicious code, vulnerabilities, and attacks.
  • Ownership of threat intelligence monitoring tool services, product contracts and relationships.
  • Assist in the evaluation, development, testing, and implementation of emerging data access control technologies, information systems security issues, safeguards, and techniques.
  • Recommend mitigation Tactics Techniques and Procedures (TTPs) for identified malicious logic within the customer's environment.
  • Maintain current knowledge of tools and best practices in advanced persistent threats.
  • Perform periodic and ad-hoc threat hunting exercises using the Threat Intelligence tools and ensure delivery of the below services working with the OEM:
    • Attack Surface Management
    • Dark Web and Cyber Crime Monitoring and Intelligence
    • Brand Protection and Social Media Monitoring
    • VIP/Executive Monitoring
    • Cyber Threat Intelligence
    • Incident Response
Required Skills:
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.