Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Threat Intelligence (CTI) Analyst

QUANTUM INFOTECH SOLUTIONS PTE. LTD.

Singapore

On-site

SGD 90,000 - 120,000

Full time

3 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity firm in Singapore is seeking a skilled Threat Hunting and Analysis expert with at least 8 years of experience in cybersecurity. Responsibilities include conducting proactive threat hunting, analyzing security logs, and managing Cyber Threat Intelligence. Ideal candidates must have a Bachelor's degree in Computer Science or Cybersecurity, strong analytical skills, and proficiency in scripting. Experience with security tools, a deep understanding of operating systems, and relevant security certifications are essential. This is a critical role in strengthening the organization's security posture.

Qualifications

  • Minimum 8 years of relevant experience in cybersecurity focusing on threat intelligence/hunting.
  • Strong understanding of various operating systems including Windows, Linux, and macOS.
  • Experience with threat intelligence platforms, feeds, and CTI frameworks.

Responsibilities

  • Conduct proactive threat hunting across various environments.
  • Analyze security logs and network traffic to identify malicious activity.
  • Develop and manage Cyber Threat Intelligence.

Skills

Threat Intelligence Analysis
Scripting (Python, PowerShell)
Analytical Skills
Communication Skills
Incident Investigation

Education

Bachelor's degree in Computer Science, Cybersecurity, or a related field

Tools

SIEM
EDR/XDR solutions
Network Monitoring Tools
Cloud Platforms (AWS, Azure, GCP)
Job description
Threat Hunting and Analysis
  • Conduct proactive threat hunting activities across various environments (endpoints, networks, cloud).
  • Develop and maintain threat hunting hypotheses based on current threat intelligence and organizational risk assessments.
  • Apply structured threat hunting methodologies leveraging frameworks such as MITRE ATT&CK, PEAK, TAHITI, THMM and Diamond Model to guide hypothesis creation, evidence collection and iterative improvements.
  • Deep technical knowledge of adversary tactics, malware analysis, intrusion detection and cloud security.
Tooling and Automation
  • Familiar with EDR/XDR solutions, SIEM platform, data pipeline and threat hunting tooling to detect and disrupt adversary tactics.
  • Develop custom scripts and tools to automate threat hunting processes and improve efficiency.
  • Leverage various threat hunting techniques, including but not limited to, YARA rules, IOC analysis, and behavioral based analysis.
Incident Investigation
  • Analyze security logs, network traffic, and endpoint data to identify malicious activity and potential threats.
  • Investigate security incidents and provide detailed reports on findings, including root cause analysis and remediation recommendations.
  • Collaborate with other security teams (incident response, vulnerability management, etc.) to share threat intelligence and coordinate security efforts.
Cyber Threat Intelligence (CTI)
  • Develop and manage Cyber Threat Intelligence while staying up to date on the latest threat landscape, attack techniques, and emerging technologies.
  • Map advisory behaviors to ATT&CK techniques and translate findings into actionable intelligence.
  • Share actionable intelligence with internal teams and external stakeholders.
  • Present findings and recommendations to technical and executive audiences.
Continuous Improvement
  • Contributes to the development and improvement of threat hunting strategies, processes and playbooks aligning with PEAK and TAHITI cycles for structural threat hunting.
  • Develop and maintain a strong understanding of the organization's infrastructure and applications to strengthen awareness of evolving threats and adversary behavior.
  • Drive maturing of the overall security operations service.
Qualifications & Skills:
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field.
  • Minimum 8 years of relevant experience is required in cyber security focusing on threat intelligence/hunting
  • Strong understanding of various operating systems (Windows, Linux, macOS).
  • Experience with various security tools and technologies (SIEM, EDR, network monitoring tools).
  • Proficiency in scripting (Python, PowerShell).
  • Strong analytical and problem-solving skills.
  • Excellent communication and presentation skills to translate technical findings into business impact.
  • Experience with threat intelligence platforms, feeds and CTI frameworks.
  • Relevant security certifications (e.g., SANS GIAC, GNFA, GCFA, Offensive Security, etc)
  • Experience with cloud platforms (AWS, Azure, GCP) and container security is a plus.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.