Enable job alerts via email!

APT Analyst

Group-IB

Saudi Arabia

On-site

SAR 200,000 - 300,000

Full time

26 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a skilled APT Analyst to generate comprehensive cyber threat reports. This role involves analyzing Advanced Persistent Threat activities and intrusion tactics while leveraging various resources to investigate threats. You'll be responsible for crafting detection opportunities and developing mitigation strategies based on threat intelligence. If you have a keen interest in the cyber threat landscape and experience in profiling threat actors, this is the perfect opportunity to join a dynamic team focused on cybersecurity excellence in the META region.

Qualifications

  • Experience in analyzing the cybercrime community and profiling threat actors.
  • Understanding of the threat landscape in the META region.

Responsibilities

  • Generate cyber threat reports covering APT activities and intrusion tactics.
  • Analyze IOCs and TTPs of threat actors from the META Threat Landscape.

Skills

Threat Analysis
Cybercrime Profiling
Scripting (Python, Bash)
Network Technologies
Interpersonal Skills
Communication Skills

Education

Bachelors in Computer Application

Tools

Virustotal
Urlscan
Shodan
RiskIQ
Public Sandboxes
Threat Intelligence Platforms

Job description

Bachelors in Computer Application (Computers)

Nationality: Any Nationality

Vacancy: 1 Vacancy

Job Description

What makes the role special: The selected candidate will be responsible for generating comprehensive cyber threat reports for both internal stakeholders and clients/partners. The reports will primarily cover Advanced Persistent Threat (APT) activities, intrusion tactics, techniques and procedures (TTP), as well as targeted entities. The role will involve leveraging internal and external resources to investigate threats and vulnerabilities, while also analyzing different threat actors and their attack infrastructure.

Tasks to solve:
  1. Analyzing IOCs and TTPs of the Threat Actors from the META Threat Landscape;
  2. Craft, maintain, and document detection opportunities within the Threat Intelligence platform;
  3. Perform necessary correlation and research to create useful, compelling, and context-rich alerts for customers;
  4. Pursue research into current threats and industry trends to be aware of the most up-to-date threats in the META Threat Landscape;
  5. Drive initiatives to create detection content based on findings stemming from threat hunts and ad hoc detection opportunities;
  6. Develop mitigation and countermeasure strategies from collected threat intelligence;
  7. Leveraging MITRE ATT&CK categorization to align observed threat actor activity to Tactics, Techniques, and Procedures (TTPs).

This role is perfect for you if:

  1. Understanding and interest in the threat landscape in the META region;
  2. Experience in analyzing the cybercrime community, and profiling the threat actors;
  3. Basic knowledge of scripting language (Python, Bash);
  4. Knowledge of network technologies and principles of functioning of data networks, understanding of the features of the common data transfer protocols;
  5. Knowledge of OS architecture and operating principles;
  6. Good interpersonal skills, as well as the ability to communicate effectively orally and in writing;
  7. Experience in working with the following sources:
  • Virustotal
  • Urlscan
  • Shodan
  • RiskIQ
  • Public sandboxes
  • Optionally: Group-IB or other Threat Intelligence platforms

What else we appreciate in our team:

  1. Fluent in Arabic;
  2. Fluent in English (Minimum B2);
Company Industry
  • IT - Hardware & Networking
Department / Functional Area
  • IT Software
Keywords
  • APT Analyst
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.