Join the World of Cyber Security - Become a Cyber Threat Intelligence Analyst
Welcome to the dynamic world of Cyber Security!
At the heart of our defense against cyber threats lies the Security Operations Center (SOC). The SOC is composed of several specialized teams, each playing a crucial role in protecting our organization
- Cyber Threat Intelligence (CTI) gathers data on potential threats, contextualizes it and delivers actionable insights to support decision-making and trigger new alerts.
- Use Case Design ensures that our infrastructure is equipped with the right triggers to detect potential threats.
- Security Analysts (T1/T2/T3) investigate alerts when they are triggered.
- Cyber Security Incident Response Team (CSIRT) coordinates the response when alerts escalate into full-scale incidents.
Your Role as a Cyber Threat Intelligence Analyst
- As a Security Threat Intelligence Analyst, you will provide intelligence on threats and threat actors, assess the risks they pose to our IT environment, and recommend enhancements to our security controls.
- “As a senior Information Security Engineer, you have over 5 years of experience in proactively and reactively monitoring and remedying security breaches
- Usually, you are part of the SOC (security operations center)
- You investigate suspicious activities and take remediating actions
- You maintain Security Monitoring Tools to effectively secure and monitor the different systems
- You perform penetration tests to find any flaws
- You document, test and monitor any security breaches and assess their damage.”
Job requirements
You will:
- Conduct research on emerging threats relevant to the organization
- Identify and classify threat actors and campaigns
- Prepare and present CTI reports to the cybersecurity community
- Understand the organization's critical IT assets and security controls
- Collaborate on threat hunting and use case development
- Analyze adversary tactics and identify gaps in our defenses
- Recommend improvements to our security architecture
- Review and interpret external threat intelligence sources and reports
- Suggest enhancements to detection use cases based on internal and external insights
- Liaise with the CERT team to share intelligence and foster collaboration
Key competencies for success
- Strong knowledge of threat impact assessment techniques
- Experience supporting use case design and correlation rule development
- Familiarity with log management and SIEM tools
- Proficiency with commercial and open-source security tools (e.g., Epp, EDR, SIEM)
- Skilled in log analysis using regular expressions and natural language queries
- Understanding of network traffic analysis and packet capture
- Solid grasp of encryption and cryptography
- Familiarity with frameworks like MITRE ATT&CK, Kill Chain, or the Diamond Model is a strong plus