Foresiet is seeking an experienced Cyber Threat Intelligence (CTI) Analyst to join our team.
In this role, you will be responsible for monitoring social, deep, and dark web activities, conducting in-depth research on emerging threats, and analyzing malware to identify potential risks and vulnerabilities.
The ideal candidate should have a minimum of 2 years of relevant experience in threat intelligence and possess strong analytical and technical skills
Responsibilities:
Conduct monitoring and analysis of social media platforms, deep web, and dark web channels to identify potential cyber threats, brand impersonation, and data breaches.
Perform in-depth research and analysis on emerging threats, hacking techniques, and malware to stay ahead of evolving cyber threats.
Collect and analyze threat intelligence data from various sources to identify patterns, trends, and potential vulnerabilities write contextual threat intelligence reports.
Collaborate with cross-functional teams to enhance existing threat intelligence processes and contribute to the development of new methodologies and tools.
Provide timely and accurate threat intelligence reports, including actionable recommendations and mitigation strategies, to internal stakeholders.
Stay updated with the latest industry trends, threat actors tactics, techniques, and procedures (TTPs), and emerging cyber threats.
Conduct malware analysis to identify and understand malware behavior, capabilities, and potential impact on organizational systems and networks.
Collaborate with incident response teams to provide insights and recommendations for effective incident handling and mitigation.
Participate in threat hunting activities, proactively seeking out indicators of compromise (IOCs) and potential security gaps within the organizations digital assets.
Contribute to the development and improvement of threat intelligence tools, processes, and frameworks.
Requirements:
Bachelors degree
Minimum of 2 years of experience in threat intelligence, social, deep, and dark web monitoring, and malware research.
Strong understanding of cyber threat landscape, threat actors, and common attack vectors.
Proficiency in using threat intelligence tools, open-source intelligence (OSINT) techniques, and analysis platforms.
Experience in malware analysis and familiarity with tools such as IDA Pro, OllyDbg, or similar.
Solid knowledge of networking protocols, malware behavior, and security best practices.
Familiarity with threat intelligence frameworks and industry standards such as MITRE ATT&CK, STIX/TAXII, or similar.
Excellent analytical and problem-solving skills with the ability to identify and mitigate emerging threats.
Strong written and verbal communication skills, with the ability to effectively convey complex technical concepts to non-technical stakeholders.
Relevant certifications such as Certified Threat Intelligence Analyst (CTIA), GIAC Certified Threat Intelligence Analyst (CTIA), or similar, are a plus