Enable job alerts via email!

Cyber threat intelligence Analyst

Securseed

Saudi Arabia

On-site

SAR 200,000 - 300,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a Cyber Threat Intelligence Analyst to enhance their cyber security operations. This role involves delivering strategic and tactical intelligence, managing the full lifecycle of threat intelligence, and producing actionable recommendations. The ideal candidate will have over 5 years of operational experience, a solid understanding of security incident response, and expertise in threat modeling frameworks. Join a dynamic team where your insights will shape the organization's security posture and help protect critical infrastructure. If you're passionate about cyber security and ready to make an impact, this opportunity is for you.

Qualifications

  • 5+ years experience as a threat intelligence analyst with a strong focus on security incident response.
  • Knowledge of threat intelligence tooling and frameworks like MITRE ATT&CK and cyber kill chain.

Responsibilities

  • Develop and manage cyber threat intelligence sources and evaluate intelligence for accuracy.
  • Produce threat intelligence reports and provide analysis for security posture improvements.

Skills

Threat Intelligence Analysis
Security Incident Response
Malware Analysis
Network Security
Digital Forensics
Threat Modeling
Communication Skills
Presentation Skills

Education

Degree or equivalent (i.e. MBA)

Tools

Threat Intelligence Tooling
IPS/IDS Systems

Job description

Job description

The Cyber Threat Intelligence Analyst will deliver and develop strategic and tactical Cyber Threat Intelligence capabilities within the cyber security operations team.

The role holder will maintain a clear understanding of the threat landscape, identify new sources of intelligence, and aggregate and analyze data to provide accurate and actionable recommendations. They will help manage the complete cyber threat intelligence lifecycle and ensure that this is appropriately integrated into relevant processes and tools.

The Cyber Threat Intelligence Analyst will be responsible for compiling, articulating and presenting cyber threat intelligence briefings for the Senior Cyber Threat Analyst as well as compiling clear and concise threat intelligence reports.

Job Responsibilities

  1. Help develop, configure and manage a suite of cyber threat intelligence sources
  2. Evaluate intelligence for accuracy, reliability, and relevance across multiple intelligence sources
  3. Help develop and maintain close links with cyber threat intelligence functions within partner organizations and government agencies
  4. Perform analysis across the estate, looking for threats to critical infrastructure, resources and services
  5. Help develop and produce threat intelligence reports, to provide key metrics into other internal cyber functions (Security Incident Response, Threat Hunting, etc.).
  6. Carry out research and discovery across the estate with a view to producing reports on CTI detections and trends (i.e. highlighted IOCs, Vulnerabilities, Malware).
  7. Manage the complete IoC lifecycle
  8. Provide analysis to feed into the overall security posture, assisting with supporting activities to further increase defenses, harden potential attack surfaces and implement better protection mechanisms.
  9. Act as CTI lead in the handling and remediation of security incidents.
  10. Maintain strong awareness with stakeholder groups of current threat landscape
  11. Review, analyze and contextualize complex threat intelligence data for wider consumption with business partners

What You'll Need

Qualification Requirements (Desirable)

  1. Certifications in security (i.e. GCTI, GREM, GCFA, GCIH) desirable but not essential
  2. Degree or equivalent (i.e. MBA) desirable but not essential
  3. Comprehensive knowledge about vulnerability and security policies such as ISO standards

Skills / Experience Requirements

  1. 5+ years operational experience as a threat intelligence analyst, with good working knowledge of security incident response and malware analysis.
  2. Experience in threat modeling and common frameworks such as the cyber kill chain and MITRE.
  3. Hands-on experience with Network Security, Digital Forensics and IPS/IDS systems.
  4. Hands-on experience with dark web analysis, including the associated tooling and adversarial slang.
  5. Solid understanding of supporting frameworks like MITRE ATT&CK, LM Cyber Kill Chain, IA Diamond Model, etc.
  6. Knowledge of supporting processes, like DFIR, Threat Hunting, Malware Analysis and red/purple team exercises.
  7. Knowledge of threat intelligence tooling, both commercial and open source.
  8. Understanding of Security Operations and supporting functions, technologies and methodologies.
  9. Ability to document findings into reports that can be understood across all levels of the organization.
  10. Strong presentation and communication skills, both verbal and written.
  11. Working knowledge of threat hunting

No of Positions: 1

Note: The candidate would be expected to work in diverse consulting engagements and is willing to travel to Middle East countries for project execution at least 50% of their time.

Preference to candidates who can join immediately or within 15 days at the max.

Employment Type: Full-time

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.