Enable job alerts via email!

Cyber Threat Intelligence Senior Analyst

Axiata Digital Labs

Kuala Lumpur

On-site

MYR 120,000 - 150,000

Full time

16 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading tech solutions provider in Kuala Lumpur is seeking an experienced Cyber Threat Intelligence Senior Analyst. You will be responsible for identifying and analyzing advanced threats through proactive intelligence hunting and response strategies. Required qualifications include a Bachelor's degree in a related field and 5 years of cybersecurity experience, with a strong focus on threat intelligence methods and tools. Join us to enhance our security capabilities.

Qualifications

  • Minimum 5 years of experience in cybersecurity, with at least 2+ years in threat intelligence or threat hunting roles.
  • Strong experience with SIEM platforms and EDR solutions.
  • Proficiency in scripting and automation for custom hunts.

Responsibilities

  • Identify, analyze, and mitigate advanced threats through proactive hunting.
  • Collaborate with SOC teams to provide intelligence-led defense against threats.
  • Automate workflows for intelligence collection and threat detection.

Skills

Threat analysis
Proactive threat hunting
Incident response collaboration
Automation scripting
Communication of technical insights
Cybersecurity expertise

Education

Bachelor's degree in Cybersecurity, Computer Science, or related field

Tools

SIEM platforms (e.g., Splunk, QRadar, ELK)
EDR solutions (e.g., CrowdStrike, SentinelOne, Carbon Black)
Threat Intelligence Platforms (TIPs) (e.g., ThreatConnect, MISP)
Scripting languages (e.g., Python, PowerShell, Bash)
Job description
Overview

We are seeking a highly skilled and motivated Cyber Threat Intelligence Senior Analyst to join our cybersecurity team. The successful candidate will be responsible for identifying, analyzing, and mitigating advanced threats through proactive hunting, intelligence gathering, and incident response support. This role requires strong technical expertise, analytical skills, and the ability to translate threat intelligence into actionable defense strategies.

Key Responsibilities
Threat Intelligence
  • Collect, analyze, and contextualize threat intelligence from internal telemetry, open sources (OSINT), dark web, commercial feeds, and ISAC/CERT channels
  • Profile threat actors, their tactics, techniques, and procedures (TTPs), and provide early-warning intelligence to stakeholders
  • Produce intelligence reports, advisories, and briefings tailored to technical and executive audiences
Threat Hunting
  • Proactively hunting for malicious activity across enterprise systems, endpoints, and networks using advanced tools (e.g., SIEM, EDR, NDR)
  • Develop, test, and deploy custom detection logic, queries, and scripts to identify anomalies and potential intrusions
  • Leverage frameworks such as MITRE ATT&CK to map adversary behaviors and improve detection coverage
Collaboration & Incident Response
  • Partner with SOC, Incident Response, and Vulnerability Management teams to provide intelligence-led defense and rapid containment of threats
  • Support red team/blue team exercises and validate new detection methodologies
  • Act as a subject matter expert (SME) for threat intelligence and threat hunting during security investigations
Continuous Improvement
  • Automate intelligence collection, enrichment, and correlation workflows
  • Contribute to the development of playbooks, hunting queries, and threat detection use cases
  • Stay current with emerging threats, vulnerabilities, and security technologies
Person Specifications
  • Bachelor's degree in Cybersecurity, Computer Science, or related field
  • Minimum 5 years of experience in cybersecurity, with at least 2+ years in threat intelligence or threat hunting roles
  • Strong experience with SIEM platforms (e.g., Splunk, QRadar, ELK), EDR solutions (e.g., CrowdStrike, SentinelOne, Carbon Black), and packet analysis tools (e.g., Zeek, Suricata, Wireshark)
  • Proficiency with threat hunting tools (e.g., Velociraptor, GRR Rapid Response, Kusto queries in Microsoft Sentinel, Elastic Hunting queries)
  • Hands-on experience with Threat Intelligence Platforms (TIPs) (e.g.ThreatConnect, MISP, Anomali, Recorded Future) for ingestion, enrichment, and operationalization of IOCs and TTPs
  • Proficiency in scripting and automation (e.g., Python, PowerShell, Bash) for custom hunts, integrations, and enrichment pipelines
  • Familiarity with malware analysis, reverse engineering, and memory forensics is a strong plus
  • Deep understanding of MITRE ATT&CK, cyber kill chain, and threat modeling frameworks
  • Experience with dark web monitoring, OSINT, and threat actor tracking
  • Strong analytical, problem-solving, and communication skills
  • Proactive, detail-oriented, and capable of working independently (onsite assignment forproject-based engagement if needed)
  • Strong communication skills with the ability to deliver complex technical insights in simpleterms
  • Team player with a passion for continuous learning and advancing organizational defensecapabilities
Certifications (Preferred)
  • GIAC Cyber Threat Intelligence (GCTI)
  • GIAC Advanced Threat Hunting, Detection, and Analysis (GDAT)
  • Certified Threat Intelligence Analyst (CTIA)
  • OSCP / OSCE / GCFA / GREM (advantageous)
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.