Job Search and Career Advice Platform

Enable job alerts via email!

Cyber Threat Intelligence (CTI) Analyst

HI5 CONSULTING SOLUTIONS PTE. LTD.

Singapore

On-site

SGD 90,000 - 120,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity consulting firm in Singapore seeks a seasoned Threat Hunting Specialist with over 8 years of experience in cyber security. The role entails proactive threat detection, incident investigation, and development of threat intelligence. Ideal candidates will have a strong background in various operating systems and security tools. Proficiency in scripting and excellent communication skills are vital. This is an opportunity to enhance and mature security operations within a collaborative environment.

Qualifications

  • Minimum 8 years of relevant experience in cyber security focusing on threat intelligence/hunting.
  • Strong understanding of various operating systems (Windows, Linux, macOS).
  • Experience with cloud platforms (AWS, Azure, GCP) is a plus.

Responsibilities

  • Conduct proactive threat hunting activities across various environments.
  • Analyze security logs and network traffic to identify malicious activity.
  • Develop and manage Cyber Threat Intelligence while staying up to date.

Skills

Analytical skills
Problem-solving skills
Scripting (Python, PowerShell)
Communication skills

Education

Bachelor's degree in Computer Science, Cybersecurity, or related field

Tools

SIEM
EDR
Network monitoring tools
Threat intelligence platforms
Job description
Job Responsibilities

Threat Hunting and Analysis

  • Conduct proactive threat hunting activities across various environments (endpoints, networks, cloud).
  • Develop and maintain threat hunting hypotheses based on current threat intelligence and organizational risk assessments.
  • Apply structured threat hunting methodologies leveraging frameworks such as MITRE ATT&CK, PEAK, TAHITI, THMM and Diamond Model to guide hypothesis creation, evidence collection and iterative improvements.
  • Deep technical knowledge of adversary tactics, malware analysis, intrusion detection and cloud security.
Tooling and Automation
  • Familiar with EDR/XDR solutions, SIEM platform, data pipeline and threat hunting tooling to detect and disrupt adversary tactics.
  • Develop custom scripts and tools to automate threat hunting processes and improve efficiency.
  • Leverage various threat hunting techniques, including but not limited to, YARA rules, IOC analysis, and behavioral based analysis.
Incident Investigation
  • Analyze security logs, network traffic, and endpoint data to identify malicious activity and potential threats.
  • Investigate security incidents and provide detailed reports on findings, including root cause analysis and remediation recommendations.
  • Collaborate with other security teams (incident response, vulnerability management, etc.) to share threat intelligence and coordinate security efforts.
Cyber Threat Intelligence (CTI)
  • Develop and manage Cyber Threat Intelligence while staying up to date on the latest threat landscape, attack techniques, and emerging technologies.
  • Map advisory behaviors to ATT&CK techniques and translate findings into actionable intelligence.
  • Share actionable intelligence with internal teams and external stakeholders.
  • Present findings and recommendations to technical and executive audiences.
Continuous Improvement
  • Contributes to the development and improvement of threat hunting strategies, processes and playbooks aligning with PEAK and TAHITI cycles for structural threat hunting.
  • Develop and maintain a strong understanding of the organization's infrastructure and applications to strengthen awareness of evolving threats and adversary behavior.
  • Drive maturing of the overall security operations service.
Qualifications & Skills
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field.
  • Minimum 8 years of relevant experience is required in cyber security focusing on threat intelligence/hunting.
  • Strong understanding of various operating systems (Windows, Linux, macOS).
  • Experience with various security tools and technologies (SIEM, EDR, network monitoring tools).
  • Proficiency in scripting (Python, PowerShell).
  • Strong analytical and problem-solving skills.
  • Excellent communication and presentation skills to translate technical findings into business impact.
  • Experience with threat intelligence platforms, feeds and CTI frameworks.
  • Relevant security certifications (e.g., SANS GIAC, GNFA, GCFA, Offensive Security, etc).
  • Experience with cloud platforms (AWS, Azure, GCP) and container security is a plus.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.