Enable job alerts via email!

Cyber Threat Intelligence Analyst

Packet Systems Indonesia

Daerah Khusus Ibukota Jakarta

On-site

IDR 250.584.000 - 501.170.000

Full time

7 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in Jakarta is seeking candidates for a Cybersecurity Analyst role. The position requires a bachelor's degree in IT or related fields, along with 1-3 years of experience in cybersecurity. Key responsibilities include threat intelligence collection, monitoring cyber risks, and collaborating on incident response. Applicants should hold relevant certifications, such as EC-Council CTIA or CompTIA CySA+.

Qualifications

  • Hold a bachelor's degree (S-1) with a minimum IPK of 3.0.
  • Minimum 1-3 years' experience in cybersecurity roles.
  • Certification: EC-Council CTIA or CompTIA CySA+/Security+ is required.

Responsibilities

  • Perform cyber threat intelligence collection from various sources.
  • Monitor threat actors and emerging cyber risks.
  • Collaborate with Incident Response for context enrichment.

Skills

Cybersecurity experience
Scripting capability
Report writing
Threat intelligence understanding

Education

Bachelor's degree in Information Technology or related fields

Tools

SIEM platforms
EDR platforms
Threat Intelligence platforms
Job description
Job Requirements
  • Hold a bachelor's degree (S-1 degree) in Information Technology, Computer Engineering, Telecommunication, or related fields from a reputable university with a minimum IPK of 3.0, specialization in Cybersecurity or System Information Audit is highly regarded.
  • Minimum 1–3 years' experience in cybersecurity, SOC analyst, DFIR, or Threat Intelligence role.
  • Have certification: EC-Council CTIA or CompTIA CySA+ / Security+.
  • Experience with TI platforms: Cybel, RF, Cyberint, Mandiant, CrowdStrike Intel, etc.
  • Understanding of threat intelligence lifecycle & frameworks.
  • Familiar with SIEM/EDR platforms for IOC validation & hunting.
  • Basic knowledge of malware behavior analysis is a plus.
  • Python or scripting capability for intel automation is a plus.
  • Good report‑writing and intelligence, brief presentation skills.
Job Descriptions
  • Perform cyber threat intelligence collection from multiple sources (OSINT, dark web, deep web, CTI platform feeds, SOC telemetry).
  • Monitor threat actors, campaigns, vulnerabilities, and emerging cyber risks impacting customers.
  • Collaborate with Incident Response to enrich incident context and post‑incident threat assessments.
  • Ability to translate threat info into clear business & technical recommendations.
  • Participate in threat‑hunting cycles and contribute to detection content improvements.
  • Stay updated on latest threat trends, APT groups, malware families, and cybercriminal ecosystem.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.