Enable job alerts via email!

Threat Intelligence Analyst

PT. Permodalan Nasional Madani (Persero)

Jakarta Selatan

On-site

IDR 200.000.000 - 300.000.000

Full time

Yesterday
Be an early applicant

Job summary

A financial technology company in Jakarta Selatan is seeking a Threat Intelligence Analyst to safeguard its digital ecosystem. The role involves conducting vulnerability assessments, performing penetration tests, and collaborating with cross-functional teams to fortify the organization's security posture. Ideal candidates will have a Bachelor's degree in a relevant field and at least 2 years of experience. Relevant cybersecurity certifications are advantageous.

Qualifications

  • Minimum of 2 years of experience in security analysis or penetration testing.
  • Proficiency in vulnerability identification and risk assessment methodologies.
  • Active participation in cybersecurity skill development programs is preferred.

Responsibilities

  • Conduct vulnerability assessments and provide remediation recommendations.
  • Perform penetration testing to identify system weaknesses.
  • Monitor Threat Intelligence platforms for potential threats.

Skills

Vulnerability Assessments
Penetration Testing
Cyber Threat Intelligence
Security Assessment Tools
Information Security best practices

Education

Bachelor’s degree in Computer Science or related field

Tools

Burp Suite
Nessus
Metasploit
Job description
Overview

As Threat Intelligence Analyst you will play a critical role in safeguarding the organization’s digital ecosystem by identifying vulnerabilities, conducting penetration tests, and analyzing emerging threats. You will collaborate with cross functional teams to strengthen security posture, apply industry best practices, and provide actionable insights that mitigate risks and protect business operations.

Qualifications
  1. Bachelor’s degree or equivalent in Computer Science, Information Systems, Cybersecurity, or a related field.
  2. Minimum of 2 years of hands-on experience as a Security Analyst, Penetration Tester, or Cyber Threat Intelligence Specialist.
  3. Proven experience in conducting Vulnerability Assessments, Penetration Testing, and Threat Intelligence analysis.
  4. Strong ability to analyze threats based on findings from Vulnerability Assessments, Penetration Testing results, and Threat Intelligence data.
  5. Solid understanding of vulnerability identification and risk assessment methodologies, particularly OWASP standards.
  6. Proficiency in utilizing and interpreting results from leading security assessment tools (e.g., Burp Suite, Nessus, Metasploit, Threat Intelligence platforms).
  7. Practical knowledge and experience in applying Information Security and Cybersecurity best practices (ISO 27001, NIST-CSF, CIS Controls).
  8. Good understanding of Network Protocols, Secure SDLC practices, and Data Center infrastructure.
  9. Active participation in skill development programs such as Red Team exercises, Capture the Flag (CTF) competitions, Bug Bounty programs, or Open-Source Security projects will be a strong advantage.
  10. Relevant certifications are highly preferred, including but not limited to:
  • CompTIA Cybersecurity Analyst (CySA+)
  • CEH (Certified Ethical Hacker)
  • CPENT (Certified Penetration Testing Professional)
  • OSCP (Offensive Security Certified Professional)
  • CISSP (Certified Information Systems Security Professional)
  • Other equivalent cybersecurity certifications are considered a plus.
Job Description
  1. Conduct vulnerability assessments, validate threats, and provide recommendations for remediation.
  2. Perform penetration testing to identify weaknesses and vulnerabilities within the company’s systems.
  3. Implement system hardening on operating systems, networks, and applications in accordance with best practices.
  4. Monitor, respond to, and validate information from Threat Intelligence platforms to detect vulnerabilities and threats targeting the company’s digital assets.
  5. Validate threats and provide Indicators of Compromise (IoCs).
  6. Identify Indicators of Attack (IoAs) as well as Tactics, Techniques, and Procedures (TTPs) based on the MITRE ATT&CK framework.
  7. Monitor, respond to, and evaluate the effectiveness of security detections for Active Directory and Email Security.
  8. Provide recommendations to relevant teams to remediate security gaps and mitigate potential cyberattacks.
  9. Collaborate with Security Analysts to manage and respond to cybersecurity incidents.
  10. Work closely with stakeholders and external teams to identify and remediate system vulnerabilities.
  11. Prepare and deliver periodic cybersecurity reports based on detected threats and attack patterns.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.