Cyber Threat Intelligence Analyst (Lead)
Overview
We are seeking an experienced Cyber Threat Intelligence Analyst to lead and contribute to threat intelligence operations within a critical sector. This role focuses on monitoring the threat landscape, producing actionable intelligence, and supporting proactive cybersecurity measures.
You will work closely with cross-functional teams to identify emerging threats, assess risks, and provide strategic insights to enhance overall security posture.
Key Responsibilities
- Collaborate with a team of threat intelligence analysts to maintain situational awareness across targeted sectors
- Monitor and analyse threat actor tactics, techniques, and procedures (TTPs) to produce timely and relevant intelligence
- Define and refine intelligence requirements, including identifying appropriate data sources for analysis
- Research cyber threats impacting infrastructure and systems, and recommend mitigation strategies
- Develop threat use cases and detection signatures to identify potential attacks
- Produce intelligence deliverables such as ad-hoc threat reports, monthly trend analyses, and annual threat landscape reports
- Deliver briefings and presentations to stakeholders, including senior management and technical teams
- Support cyber incident investigations, risk assessments, malware analysis, and cyber exercises
- Ensure documentation of processes, methodologies, and intelligence workflows is maintained and updated
Requirements
- Diploma in Information Security, or a Bachelor’s degree in Computer Science, Engineering, Information Security, or equivalent
- Minimum 5 years of experience in threat intelligence, with at least 1 year in a leadership or mentoring capacity
- Proven experience delivering threat briefings to senior stakeholders, operational teams, and clients
- Experience in publishing threat intelligence reports, vulnerability research, and incident assessments
- Strong familiarity with frameworks such as MITRE ATT&CK, including indicators of compromise (IOCs) and mitigation strategies
- Hands-on experience with Threat Intelligence Platforms and their integration with security tools
- Knowledge of telecommunications, media technologies, or enterprise IT environments is advantageous
- Experience in network traffic/log analysis, digital forensics, or malware analysis
- Exposure to Endpoint Detection & Response (EDR) tools and detection engineering is a plus
- Understanding of network and operating system security (Windows, Linux), cloud, or application security
- Relevant certifications such as CREST CCTIM/CRTIA/CPTIA or GIAC (GCFA, GREM, GCFE, GCIH) are preferred
- Strong analytical thinking and problem-solving skills
- Good communication and interpersonal skills
Additional Information
- Compensation will be commensurate with experience
- Only shortlisted candidates will be contacted