Overview
As Threat Intelligence Analyst you will play a critical role in safeguarding the organization’s digital ecosystem by identifying vulnerabilities, conducting penetration tests, and analyzing emerging threats. You will collaborate with cross functional teams to strengthen security posture, apply industry best practices, and provide actionable insights that mitigate risks and protect business operations.
Qualifications
- Bachelor’s degree or equivalent in Computer Science, Information Systems, Cybersecurity, or a related field.
- Minimum of 2 years of hands-on experience as a Security Analyst, Penetration Tester, or Cyber Threat Intelligence Specialist.
- Proven experience in conducting Vulnerability Assessments, Penetration Testing, and Threat Intelligence analysis.
- Strong ability to analyze threats based on findings from Vulnerability Assessments, Penetration Testing results, and Threat Intelligence data.
- Solid understanding of vulnerability identification and risk assessment methodologies, particularly OWASP standards.
- Proficiency in utilizing and interpreting results from leading security assessment tools (e.g., Burp Suite, Nessus, Metasploit, Threat Intelligence platforms).
- Practical knowledge and experience in applying Information Security and Cybersecurity best practices (ISO 27001, NIST-CSF, CIS Controls).
- Good understanding of Network Protocols, Secure SDLC practices, and Data Center infrastructure.
- Active participation in skill development programs such as Red Team exercises, Capture the Flag (CTF) competitions, Bug Bounty programs, or Open-Source Security projects will be a strong advantage.
- Relevant certifications are highly preferred, including but not limited to:
- CompTIA Cybersecurity Analyst (CySA+)
- CEH (Certified Ethical Hacker)
- CPENT (Certified Penetration Testing Professional)
- OSCP (Offensive Security Certified Professional)
- CISSP (Certified Information Systems Security Professional)
- Other equivalent cybersecurity certifications are considered a plus.
Job Description
- Conduct vulnerability assessments, validate threats, and provide recommendations for remediation.
- Perform penetration testing to identify weaknesses and vulnerabilities within the company’s systems.
- Implement system hardening on operating systems, networks, and applications in accordance with best practices.
- Monitor, respond to, and validate information from Threat Intelligence platforms to detect vulnerabilities and threats targeting the company’s digital assets.
- Validate threats and provide Indicators of Compromise (IoCs).
- Identify Indicators of Attack (IoAs) as well as Tactics, Techniques, and Procedures (TTPs) based on the MITRE ATT&CK framework.
- Monitor, respond to, and evaluate the effectiveness of security detections for Active Directory and Email Security.
- Provide recommendations to relevant teams to remediate security gaps and mitigate potential cyberattacks.
- Collaborate with Security Analysts to manage and respond to cybersecurity incidents.
- Work closely with stakeholders and external teams to identify and remediate system vulnerabilities.
- Prepare and deliver periodic cybersecurity reports based on detected threats and attack patterns.