7,714 Cybersecurity Specialists jobs in the United States
Cybersecurity Threat Intelligence Lead

Posted 17 days ago
Job Viewed
Job Description
Become a part of the diverse and inclusive team within our nationally recognized award-winning Bank that is one of the strongest in the nation. Woodforest National Bank is privately owned, and our Employee Stock Ownership Plan is the largest shareholder. We focus on building relationships and discovering opportunities to better serve our communities and understand the financial needs of every customer we serve. At Woodforest we care and prove it by volunteering with local charities and foodbanks to give back to the communities we serve. By joining Woodforest you will become a part of one of the largest employee-owned banks in the country!
The Cybersecurity Threat Intelligence Lead will serve as the primary (or SME) on threats against the Bank's reputation, brand, and systems through multiple threat intelligence sources. The role will be responsible for design and implementation of threat intelligence systems and will also play a significant role in threat hunting and penetration testing activities.
This position will work 'in-office' during an initial training period. Once the training period is successfully completed, this position, at the manager's discretion, is eligible for hybrid work schedule.
Key Responsibilities:
· Works closely with internal technology teams, business stakeholders, MSSP, and outside vendors to research, analyze and monitor security threats.
· Mentors other analysts responsible for threat intel, incident response, network, cloud, endpoint and database security.
· Deploys and manages security solutions to assist with logging, alerting, and threat analysis.
· Security system monitoring and alerting appropriate parties of vulnerabilities, attacks, and other security issues.
· Recommends and implements policies and procedures to ensure adherence to security standards.
Competencies Required:
· Demonstrated success in managing, analyzing, and solving complex network technical issues.
· Technical knowledge of security configurations, log analysis, intrusion detection and mitigation.
· Strong verbal communication and technical writing skills with an ability to effectively interact with and convey information to people who possess varying levels of understanding on applicable topics.
· Ability to work independently while supporting a team environment.
· Solid understanding of network security practices, systems, and standards.
· Strong technology skills, including intermediate proficiency with Microsoft Office (Word, Excel, Outlook, PowerPoint, Visio) SIEM and EDR platforms.
· Customer service orientation with proven process and project management skills.
· Strategic and problem-solving mindset with developed analytical abilities and organizational skills.
Minimum Qualifications/Experience:
· 5 years' network or systems administration experience required.
· 2 years' EDR management experience required.
· 1 years' SIEM management experience required.
· Other beneficial experience, (i.e., VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, Threat Reputation/Intel Solution, CASB, Python, or Automation/Orchestration), preferred.
· Financial services or banking industry experience preferred.
Formal Education & Certification:
· IT related degree preferred.
Work Status:
· Full-Time.
Supervisory Responsibility:
· None.
Travel:
· Less than 10% travel expected.
Working Conditions:
· Conditions involve lifting no more than ten pounds, sitting most of the time, but may involve walking, moving, or standing for brief periods, and occasionally lifting and carrying articles like files, ledgers, folders, etc.
Disclaimer:
This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Nothing herein restricts management's right to assign or reassign duties and responsibilities to this job at any time.
Woodforest is an Equal Opportunity Employer, including Disability and Veterans.
**Job:** **Technology Services*
**Organization:** **Texas - Houston*
**Title:** *Cybersecurity Threat Intelligence Lead*
**Location:** *Texas-The Woodlands*
**Requisition ID:** * *
Senior Cybersecurity Threat Intelligence Analyst

Posted 4 days ago
Job Viewed
Job Description
**Responsibilities include but are not limited to:**
+ Proactively identifies, analyzes, and mitigates cybersecurity threats to the organization.
+ Possesses advanced skills in threat intelligence collection, analysis, and dissemination, with a deep understanding of the threat landscape and attack vectors.
+ Leads the development and implementation of threat intelligence strategies, ensuring the organization has timely and actionable insights to defend against evolving threats.
+ Conducts in-depth research on threat actors, malware, vulnerabilities, and attack techniques, producing comprehensive threat assessments and providing expert guidance on mitigation strategies.
+ Collaborates effectively with Security Teams, incident responders, and other stakeholders to proactively address threats and enhance the organization's security posture.
+ Is responsible for developing and maintaining threat intelligence platforms and tools, automating intelligence gathering, staying abreast of trends and techniques, and provides direction and mentorship to subordinate staff and coordinate with other Cybersecurity Threat Intelligence Analyst
**Minimum Qualifications:**
+ BA/BS in field necessary to assume Cybersecurity Threat Intelligence Analyst duties or 4 years of additional experience in lieu of a degree
+ 9+ years of experience with 5+ years of relevant Cybersecurity Threat Intelligence Analyst experience.
+ Progressive experience in cybersecurity threat intelligence or related areas, with a focus on threat analysis and mitigation.
+ Demonstrated expertise in collecting, analyzing, and disseminating threat intelligence from various sources (e.g., open-source intelligence (OSINT), threat feeds, security vendors).
+ Strong understanding of the cybersecurity threat landscape, including common attack vectors, threat actors, malware, and vulnerabilities.
+ Experience with threat intelligence platforms and tools (e.g., ThreatConnect, Anomali, MISP).
+ Experience with data analysis and visualization techniques.
+ CompTIA Security+ or equivalent. DoD -M IAT Level II certification.
**Preferred Qualifications:**
+ Master's degree in Cybersecurity, Intelligence Studies, or a related field.
+ Experience with incident response and threat hunting. Experience with malware analysis and reverse engineering, and security automation and orchestration.
+ Experience with developing and implementing threat intelligence strategies and advanced threat intelligence certifications (e.g., TRE). Certifications in digital forensics or incident response (e.g., GCFA, GCIH).
+ Experience with military/diplomatic operations working within a J-6/G-6/S-6 Directorate or with Special Operations Forces (SOF) or the Department of State (DoS), leading and performing cybersecurity risk assessments for and across multiple commands, agencies, and regionally distributed locations in a Security Operations Center (SOC).
+ At least one industry-recognized threat intelligence certification (e.g., Certified Threat Intelligence Analyst (CTIA), GCTI).
+ Experience at a DoD Combatant Command (e.g., SOUTHCOM, NORTHCOM, CENTCOM, CYBERCOM, INDOPACOM, EUCOM, AFRICOM, STRATCOM, TRANSCOM, SOCOM, SPACECOM) or a component is desired.
**Clearance Requirements:**
+ Must have current/active TS/SCI clearance
**Physical Requirements:**
+ Must be able to remain in stationary position for up to 50% of the time.
+ Must be able to deliver clear and effective communication verbally and via email, phone, and virtual communication platforms to interface with co-workers and customers.
+ Must be able to occasionally move about inside an office environment to access file cabinets, office machinery, and communicate with co-workers.
ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
If you are a qualified individual with a disability and require a reasonable accommodation to apply for a position with ManTech through its online applicant system, please email us at and provide your name and contact information.
Cybersecurity Analyst Cyber Threat Intelligence

Posted 4 days ago
Job Viewed
Job Description
**TEAM SUMMARY**
Responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. This team triages information collected from different threat intelligence sources, including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to a government agency's systems. This team supports enhancing the overall cybersecurity posture of an organization by delivering timely, relevant, information to stakeholders.
**ACTIVITIES & RESPONSIBILITIES**
+ Continuously monitor threat intelligence platforms, feeds, and cybersecurity news to detect emerging threats.
+ Conduct deep-dive investigations into alerts generated by Splunk or other monitoring tools.
+ Develop and maintain threat intelligence reports, dashboards, and threat models.
+ Collaborate with SOC, IR, and vulnerability management teams to contextualize and act on threat intelligence.
+ Support cyber threat hunting initiatives by leveraging threat intelligence indicators and hypotheses.
+ Participate in government-led cyber exercises or red/blue team simulations.
+ Provide regular briefings and updates to leadership and stakeholders on emerging cyber threats and trends.
+ Maintain knowledge of the latest cybersecurity trends, zero-day vulnerabilities, APT groups, and geopolitical developments impacting the threat landscape.
**SKILLS**
+ Cyber Threat Intelligence (CTI) Analysis - Identifying, analyzing, and interpreting cyber threats from various internal and external sources to assess relevance and impact on the organization.
+ Security Information and Event Management (SIEM) Tools - Proficient in using Splunk Enterprise Security for log analysis, alerting, and correlation of security events. Familiar with Microsoft Sentinel for threat detection and response.
+ Incident Response Support - Collaborating with incident response teams to provide threat intelligence that informs remediation and mitigation efforts.
+ Threat Actor Profiling - Studying adversary tactics, techniques, and procedures (TTPs) using frameworks such as MITRE ATT&CK to provide context and attribution.
+ Data Correlation and Enrichment - Correlating disparate data sets (e.g., IOC feeds, vulnerability databases, internal telemetry) to develop actionable intelligence.
+ Report Writing & Briefing - Producing written reports, threat assessments, and briefings for technical and non-technical stakeholders.
+ Communication and Stakeholder Engagement - Interfacing with cross-functional teams and government representatives to convey findings and recommend security posture enhancements.
+ Security Clearance Handling - Operating within a high-security environment with an active Top Secret (TS) clearance; handling and disseminating classified or sensitive information appropriately.
**REQUIRED QUALIFICATIONS**
+ Bachelor's degree, preferably in an IT-related field
+ 10+ years of experience in IT with a minimum of 4 years in Cybersecurity
+ Active TS Clearance
+ Experience with Splunk Enterprise Security
**PREFERRED QUALIFICATIONS & COMPETENCIES**
+ Experience with Microsoft Sentinel
+ Related certifications, such as GIAC Cyber Threat Intelligence (GCTI)
**Overview**
We are seeking an experienced **Cybersecurity Analyst / Cyber Threat Intelligence** in support of a government customer to join our team. The Program Manager will be responsible for ensuring the successful execution of multiple IT initiatives, ensuring alignment with customer objectives, and managing project scope, schedule, budget, and risk. This role requires strong leadership, communication, and problem-solving skills to drive efficiency and deliver results.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at .
Apply now to explore jobs with us!
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".
"As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration".
**Additional Job Information**
**WORK ENVIRONMENT AND PHYSICAL DEMANDS**
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
+ Location: Huntsville Alabama
+ Remote or In-Person: On site
+ Type of environment: Office
+ Noise level: Medium
+ Work schedule: Schedule is day shift Monday - Friday.
+ Amount of Travel: Less than 10%
**PHYSICAL DEMANDS**
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
**WORK AUTHORIZATION/SECURITY CLEARANCE**
+ Active Top Secret Clearance Required
**OTHER INFORMATION**
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
**EQUAL EMPLOYMENT OPPORTUNITY**
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
**Job Locations** _US-AL-Huntsville_
**ID** _ _
**Category** _Project/Program Management_
**Type** _Regular Full-Time_
Senior Cybersecurity Threat Intelligence Analyst
Posted 1 day ago
Job Viewed
Job Description
Responsibilities:
- Collect, process, and analyze threat intelligence data from diverse sources (OSINT, dark web, feeds, internal logs).
- Identify, track, and analyze Advanced Persistent Threats (APTs) and other sophisticated adversaries.
- Develop comprehensive profiles of threat actors, their TTPs, motivations, and objectives.
- Produce actionable threat intelligence reports, briefings, and alerts for various audiences.
- Provide context and analysis to support incident response, vulnerability management, and security architecture decisions.
- Develop and maintain relationships with external threat intelligence communities and information sharing groups.
- Contribute to the improvement of threat intelligence collection, analysis, and dissemination platforms and processes.
- Conduct deep-dive investigations into specific threats and campaigns.
- Present threat intelligence findings to senior management and technical teams.
- Stay current with the latest cybersecurity threats, trends, and technologies.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence analysis.
- Demonstrated experience with various threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
- Proficiency in utilizing OSINT tools and techniques for threat research.
- Experience analyzing malware, network traffic, and security logs.
- Strong understanding of geopolitical factors influencing cyber threats.
- Excellent analytical, critical thinking, and problem-solving skills.
- Superb written and verbal communication skills, with the ability to present complex information effectively.
- Relevant certifications (e.g., GCTI, CTIA) are a plus.
Senior Cybersecurity Analyst - Threat Intelligence
Posted 1 day ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze security alerts from various sources, including SIEM, IDS/IPS, and endpoint detection and response (EDR) systems.
- Conduct in-depth threat intelligence research, including actor tactics, techniques, and procedures (TTPs), malware analysis, and vulnerability assessments.
- Develop and maintain threat models to anticipate and defend against potential attacks.
- Correlate threat intelligence data with internal security incidents to identify patterns and trends.
- Produce timely and actionable threat intelligence reports for various stakeholders, including technical teams and executive leadership.
- Develop and implement proactive security measures based on threat intelligence findings.
- Collaborate with incident response teams to provide intelligence support during security investigations.
- Stay current with the latest cybersecurity threats, vulnerabilities, and industry best practices.
- Contribute to the continuous improvement of threat intelligence tools and processes.
- Mentor junior analysts and share knowledge across the security team.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, or a related field; Master's degree preferred.
- 5+ years of experience in cybersecurity, with a focus on threat intelligence, security operations, or incident response.
- Strong understanding of cyber threat landscapes, attack methodologies, and defensive security principles.
- Proficiency with SIEM, EDR, and other security monitoring tools.
- Experience with threat intelligence platforms (TIPs) and open-source intelligence (OSINT) gathering.
- Excellent analytical, problem-solving, and critical-thinking skills.
- Strong written and verbal communication skills, with the ability to explain complex technical information clearly.
- Relevant certifications such as CISSP, GIAC (GCIH, GCFA), or similar are highly desirable.
- Experience with scripting languages (e.g., Python) for automation is a plus.
- Ability to work effectively in a remote, collaborative environment.
Lead Cybersecurity Engineer - Threat Intelligence
Posted 1 day ago
Job Viewed
Job Description
Key responsibilities include gathering, analyzing, and disseminating threat intelligence from various sources, such as open-source intelligence (OSINT), dark web monitoring, and vendor feeds. You will conduct in-depth research on threat actors, their motivations, and their tactics, techniques, and procedures (TTPs). The Lead Cybersecurity Engineer will also be tasked with developing custom detection rules, correlating security events, and supporting incident response activities with timely intelligence. You will collaborate closely with security architects, engineers, and SOC analysts to enhance our security posture and reduce our attack surface. The ideal candidate will possess exceptional analytical and problem-solving skills, a proactive mindset, and the ability to mentor and guide junior team members. Expertise in security information and event management (SIEM) systems, threat intelligence platforms (TIPs), and various cybersecurity tools is crucial. This is a unique opportunity to lead and innovate within a critical function, safeguarding the organization against evolving cyber threats.
Key Responsibilities:
- Develop and implement comprehensive threat intelligence strategies and programs.
- Lead and mentor a team of cybersecurity threat intelligence analysts.
- Identify, analyze, and track emerging cyber threats, threat actors, and their TTPs.
- Collect and curate threat data from diverse sources (OSINT, dark web, commercial feeds).
- Develop actionable intelligence reports and briefings for technical and executive audiences.
- Integrate threat intelligence into security operations, incident response, and risk management processes.
- Design and implement threat hunting methodologies and playbooks.
- Configure and optimize SIEM and TIP platforms for effective threat detection.
- Collaborate with security engineering and operations teams to deploy defensive countermeasures.
- Conduct vulnerability assessments and penetration testing support.
- Stay current with the latest cybersecurity trends, vulnerabilities, and threat actor methodologies.
- Contribute to the development of security policies and procedures.
Qualifications:
- Bachelor's or Master's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 7 years of experience in cybersecurity, with at least 3 years focused on threat intelligence or advanced security analysis.
- Proven experience leading technical teams and managing security projects.
- Expertise in threat intelligence methodologies, frameworks (e.g., MITRE ATT&CK), and tools.
- Strong understanding of network security, endpoint security, cloud security, and malware analysis.
- Proficiency with SIEM, SOAR, and threat intelligence platforms.
- Excellent analytical, research, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to present complex technical information clearly.
- Relevant cybersecurity certifications (e.g., CISSP, GIAC certifications).
- Experience with scripting or programming languages (e.g., Python, PowerShell) is a plus.
Senior Cybersecurity Analyst, Threat Intelligence (Remote)
Posted 1 day ago
Job Viewed
Job Description
Be The First To Know
About the latest Cybersecurity specialists Jobs in United States !
Security Analyst - Threat Intelligence
Posted 1 day ago
Job Viewed
Job Description
A World-Changing Company
Palantir builds the worlds leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more.
The Role
As a Security Analyst on Palantirs Global Security team, you will work alongside various internal teams to analyze potential external threats, and mitigate the risks posed to Palantir leadership, assets, and people. We are looking for a motivated self-starter who is eager to fuse their operational security (OPSEC) expertise, threat investigation skills, and analytical abilities to guide Palantir investigations towards positive security outcomes. In this role you will engage closely with Information Security, Compliance, Legal, Physical Security, and Internal Investigations teams, as well as other internal/external stakeholders. This role requires established open source investigations and research skills, experience in Counterintelligence (CI), strong analytical writing and briefing/debriefing skills, and an appetite to become more technical with data analytics tooling. You must be able to synthesize complex information from various sources and convey risk, as well as present investigative/analytical assessment data, in a clear and concise manner to internal and external stakeholders, including company leadership.
Core Responsibilities- Monitor, identify, and analyze external security indicators to determine their impact on Palantir assets.
- Synthesize data and findings with general trend research to provide investigative support to the Threat Intelligence team and corporate security operations.
- Utilize sound prioritization skills to triage potential security risks and assess the validity/severity of incidents.
- Collaborate with internal and external stakeholders when required to investigate external threats.
- Explore open source resources and social media for threats and security-related information to identify potential risks to employees, customers, and facilities in advance of or in response to actual incidents.
- Evaluate the changing global risk environment in real time where Palantir has interests and provide updated CI and security guidance accordingly.
- Strong OSINT investigative skillset
- Hands-on experience leveraging open source monitoring tools
- Strong written and verbal communication skills
- Ability to present complex security and counterintelligence issues to varied audiences
- Geographical experience or subject matter expertise outside of the US preferred
- An active security clearance or the ability to acquire a security clearance
- Willingness and ability to travel up to 25% of the time and work a varied schedule based on the needs of the team
- 5+ years experience conducting open source investigations and security analysis; formal training strongly preferred.
- 4+ years experience in law enforcement, intelligence, or national security sectors conducting security analysis and investigations.
Salary
The estimated salary range for this position is estimated to be $80,000 - $155,000/year. Total compensation for this position may also include Restricted Stock units, sign-on bonus and other potential future incentives. Further note that total compensation for this position will be determined by each individuals relevant qualifications, work experience, skills, and other factors. This estimate excludes the value of any potential sign-on bonus; the value of any benefits offered; and the potential future value of any long-term incentives.
Benefits
- Employees (and their eligible dependents) can enroll in medical, dental, and vision insurance as well as voluntary life insurance
- Employees are automatically covered by Palantirs basic life, AD&D and disability insurance
- Commuter benefits
- Take what you need paid time off, not accrual based
- 2 weeks paid time off built into the end of each year (subject to team and business needs)
- 10 paid holidays throughout the calendar year
- Supportive leave of absence program including time off for military service and medical events
- Paid leave for new parents and subsidized back-up care for all parents
- Fertility and family building benefits including but not limited to adoption, surrogacy, and preservation
- Stipend to help with expenses that come with a new child
- Employees can enroll in Palantirs 401k plan
Life at Palantir
We want every Palantirian to achieve their best outcomes, thats why we celebrate individuals strengths, skills, and interests, from your first interview to your longterm growth, rather than rely on traditional career ladders. Paying attention to the needs of our community enables us to optimize our opportunities to grow and helps ensure many pathways to success at Palantir. Promoting health and well-being across all areas of Palantirians lives is just one of the ways were investing in our community. Learn more at Life at Palantir and note that our offerings may vary by region.
If you want to empower the world's most important institutions, you belong here. Palantir values excellence regardless of background. We are proud to be an Equal Opportunity Employer for all, including but not limited to Veterans and those with disabilities. Palantir is committed to making the application and hiring process accessible to everyone and will provide a reasonable accommodation for those living with a disability. If you need an accommodation for the application or hiring process, please reach out and let us know how we can help.
#J-18808-LjbffrSenior Information Security Analyst - Threat Intelligence
Posted today
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze global threat intelligence feeds and open-source information.
- Identify and assess emerging cyber threats, vulnerabilities, and attacker TTPs.
- Produce timely and actionable threat intelligence reports for various stakeholders.
- Conduct threat hunting operations to proactively detect and respond to advanced threats.
- Support incident response activities by providing relevant threat context.
- Perform vulnerability assessments and coordinate remediation efforts.
- Develop and maintain security playbooks and response procedures.
- Collaborate with security operations center (SOC) analysts to improve threat detection.
- Stay current with the latest cybersecurity trends, tools, and techniques.
- Contribute to security awareness initiatives and training programs.
- Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field.
- 5+ years of experience in information security, with a focus on threat intelligence or security analysis.
- Strong understanding of cybersecurity frameworks, protocols, and attack vectors.
- Experience with threat intelligence platforms, SIEM tools (e.g., Splunk, QRadar), and endpoint detection and response (EDR) solutions.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation is a plus.
- Excellent analytical, research, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to produce clear and concise reports.
- Relevant security certifications such as CISSP, GIAC, or CompTIA Security+ are preferred.
- Ability to work independently and as part of a collaborative remote team.
- Experience in incident response or digital forensics is beneficial.
Senior Information Security Analyst, Threat Intelligence
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Monitor the global threat landscape for emerging cyber threats and vulnerabilities.
- Collect, analyze, and correlate threat intelligence data from diverse sources.
- Develop and maintain threat models and intelligence reports.
- Provide actionable threat intelligence insights to security operations and incident response teams.
- Assess the potential impact of threats on the organization and recommend mitigation strategies.
- Contribute to the development and improvement of security policies and procedures.
- Support incident response activities with timely and relevant threat intelligence.
- Conduct forensic analysis of security incidents and assist in root cause determination.
- Stay abreast of the latest cybersecurity trends, tools, and techniques.
- Develop and maintain relationships with external threat intelligence communities and information sharing groups.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 5 years of experience in information security, with a specialization in threat intelligence or cybersecurity analysis.
- Proven experience in collecting, analyzing, and reporting on threat intelligence.
- Strong understanding of cyber threat actors, tactics, techniques, and procedures (TTPs).
- Proficiency with SIEM, IDPS, EDR, and other security monitoring tools.
- Experience with OSINT gathering and analysis.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to present complex information clearly.
- Relevant certifications such as CISSP, GIAC GCTI, or equivalent are a plus.