Cyber Threat Intelligence Analyst
Description
Work as a Cyber Threat Intel Analyst in DTS Solution Hawk Eye CSOC cyber command center.Analyze and research known indicators, correlate events, identify malicious activity, and discover new sources to provide early warning related to a variety of Cyber threats.Monitor Open Source information feeds and threat actor activity to identify activity levels and indicators for Cyber threats and Cyber-attacks.Identify Open Source Intelligence (OSINT) threats relevant to the DTS Solution - Hawk Eye CSOC customer s environment and develop relevant reports.Provide daily (business day) collections, reviews, analysis and filtering of Open Source Intelligence (OSINT) and SOCMINT (Social Media Intelligence)Identify and investigate malicious actors with the interest and capability to target client and its infrastructure.Develop and provide a Cyber Threat Intelligence Report, Monthly Report and Quarterly Report and an Annual Report.Reviews all current threat intelligence feeds in use, categorizes and prioritizes by relevancy.Provide proactive APT hunting, incident response support, and advanced analytic capabilities.Analyze threat information reports and intelligence summaries, trends, gaps, and methods of operation.Review audit logs and identify any unusual or suspect behavior.Initiates ad-hoc threat intelligence work parcel assignments for Tier I/II analysts and reviews/expands the SOC daily recurring activity SOP s.Develops reports that can be sent for awareness to various groups and levels of leadership.Engage constructively in cross-functional projects designed to improve DTS Solution - Hawk Eye CSOC and its customers security postures.Understanding of geo-political dynamics and how they affect the wider cyber threat landscape.Experience using Cyber Kill Chain.Expertise on in using Threat Intelligence Platforms (Recorded Future, Flashpoint, Blueliv, Anomali, Threat IQ etc.)Expertise in using Digital Risk Management platforms that looks for dark web activities, breaches,Have a curated list of important threat intel fusion across various sources Knowledge on dark web and accessing dark web forums, IRCs, chat groups etc.Knowledge on APT groups and monitoring all activities through handlers Curate newsletter and social media weekly posts based on weekly activities in the cyberspace.Qualifications4+ years of experience on extract and disseminate open source intelligence (OSINT)Regional expertise as applied to threat actors Familiarity with alternative analysis techniques and predictive analysis methodology Experience with conducting intelligence investigations and familiarity with investigative tools, including Maltego, Domain Tools, and Virus Total Familiarity with Threat Rating Methodology Active memberships with associations across the security and intelligence community Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@naukrigulf.com#J-18808-Ljbffr
Posted: 4th July 2025 11.26 am
Application Deadline: N/A
Similar Jobs
Explore more opportunities like this