Enable job alerts via email!

Jr. Threat Intelligence Analyst

HRTX

Southern Manila District

On-site

PHP 600,000 - 800,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity firm is seeking a Jr. Threat Intelligence Analyst to research and analyze emerging cyber threats. You will produce concise reports for both technical and non-technical audiences, utilize OSINT, and collaborate with teams across the globe. The ideal candidate has a solid grounding in cyber threats, excellent writing skills, and the ability to work in a fast-paced environment. This role requires flexibility for various shifts.

Qualifications

  • At least 1 year in cybersecurity or cyber threat intelligence, or 2 years in technical writing.
  • Solid understanding of basic cyber threats including malware and phishing.
  • Ability to interpret raw data and translate it into coherent reports.

Responsibilities

  • Conduct in-depth research on cyber threats using OSINT sources.
  • Identify and assess trending cyberattacks.
  • Map identified threats to recognized frameworks.

Skills

Cyber threat analysis
OSINT research techniques
Technical writing
Attention to detail
English comprehension
Job description
About the job Jr. Threat Intelligence Analyst

As a Threat Intelligence Analyst, you will research and analyze emerging cyber threats, produce concise analyst notes, and communicate findings to both technical and non-technical audiences. You will use open-source intelligence (OSINT) and internal tools such as the Recorded Future Intelligence Cloud to inform clients and internal stakeholders of the latest cyber threat activities, ensuring timely and actionable insights.

Key Responsibilities
  • Conduct in-depth research on cyber threat events, using OSINT sources and the Recorded Future Intelligence Cloud.
  • Identify and assess trending cyberattacks, including ransomware, phishing, software vulnerability exploitation, and other emerging threats.
  • Map identified threats to frameworks such as MITRE ATT&CK and the diamond model of intrusion analysis.
  • Produce analyst notes referencing both open-source and internal intelligence, adhering to a clear, technical writing style.
  • Ensure reports are concise, informative, and appropriately tailored for defenders, technical teams, and non-technical stakeholders.
  • Publish analyst notes to the Recorded Future Intelligence Cloud, including all relevant entities (threat actors, malware, TTPs, MITRE IDs).
  • Work closely with global Threat Intelligence Analyst teams (Philippines, Australia, UK, US) to refine and validate findings.
  • Engage in team meetings to share updates, discuss guidance changes, and participate in ongoing training.
  • Provide ad-hoc support or additional coverage as needed by the business.
Process & Best Practices
  • Accurately document and interpret raw data, mapping it to recognized threat intelligence frameworks.
  • Maintain up-to-date knowledge of the cyber threat landscape and emerging trends.
  • Contribute to process improvements and share learnings/best practices within the team.
Must Have Qualifications
  • At least one (1) year of professional experience in cybersecurity, cyber threat intelligence, or a closely related field, OR at least two (2) years of professional experience in technical writing, due diligence, risk assessments, physical threat intelligence, fraud intelligence, or any role requiring substantial report writing.
  • Solid understanding of basic cyber threats (malware, phishing, trojans, botnets).
  • Familiarity with OSINT research techniques and sources.
  • Ability to accurately interpret raw data and translate it into clear, coherent reports.
  • Excellent English-language grammar and reading comprehension.
  • Demonstrable ability to produce structured, concise, and accurate written analysis tailored to different audiences.
  • Strong attention to detail and accuracy.
  • Curiosity-driven approach to research and problem-solving.
  • Ability to thrive in a collaborative, fast-paced environment.
  • Flexibility to work different shifts, including possible night shifts, as required by the business.
  • Strong organizational skills to handle multiple projects and deadlines.
Desirable (Nice to Have)
  • Prior hands-on experience with threat intelligence platforms or feeds.
  • Familiarity with applying frameworks such as MITRE ATT&CK, the diamond model, CVE standards, and/or the cyber kill chain.
  • Up-to-date awareness of current trends and ongoing developments in cybersecurity and the broader threat landscape.
  • Ability to propose actionable mitigations or defensive strategies based on threat intelligence findings.
  • Special interest and demonstrated understanding of cybersecurity issues throughout Latin America.
  • In-depth knowledge of popular news sources, including technical publications, throughout Latin America.
  • Relevant cybersecurity or threat intelligence certifications (Security+, CySA+, GCTI, GCIA, CISSP, etc.).
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.