Job description
Responsibilities
Collect, analyze, and correlate threat data from multiple sources (open-source intelligence, dark web, commercial feeds, government partners).
Monitor global and regional cyber threat trends, adversary tactics, techniques, and procedures (TTPs).
Produce intelligence reports, threat assessments, and advisories for the leadership and operational teams.
Support incident response teams with contextual intelligence during active cyber events.
Develop and maintain threat actor profiles, campaigns, and indicators of compromise (IOCs).
Collaborate with national and international intelligence-sharing communities.
Provide early warning of emerging threats to critical infrastructure and government systems.
Contribute to the development of cyber defense strategies, policies, and risk mitigation measures.
Ensure compliance with the security standards, national cybersecurity frameworks, and international best practices.
RequirementsQualifications & Experience
Bachelor’s degree in Cybersecurity, Computer Science, Information Security, or related field (Master’s preferred).
Certifications preferred: GIAC Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), CISSP, CEH.
5+ years of experience in cyber threat intelligence, SOC operations, or incident response.
Strong knowledge of threat intelligence frameworks (MITRE ATT&CK, Diamond Model, Kill Chain).
Experience with threat intelligence platforms (TIPs), SIEM, and threat hunting tools.
Familiarity with malware analysis, reverse engineering, and digital forensics.
Prior experience in government, defense, or critical infrastructure environments preferred.
Interested candidates can send their CV & CERTIFICATES to
[Click to show email] |
[Click to show email]