Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailJob Summary:
The Lead Threat Intelligence Specialist will be responsible for gathering analyzing and disseminating threat intelligence to support our cybersecurity operations. This role requires a deep understanding of the threat landscape advanced analytical skills and the ability to communicate complex information effectively. Additionally the Lead Threat Intelligence Specialist will manage and mentor a team of threat intelligence analysts ensuring the teams effectiveness and growth.
Key Responsibilities:
Collect and analyze threat intelligence from various sources including opensource intelligence (OSINT) dark web monitoring and threat feeds.
Identify and assess emerging threats vulnerabilities and attack vectors.
Develop and maintain threat intelligence reports briefings and advisories.
Collaborate with incident response teams to provide actionable intelligence during security incidents.
Monitor and analyze trends in cyber threats and provide strategic recommendations to enhance security posture.
Perform Weak Password Assessment activity
Red Team activities on BAS systems
Conduct threat hunting activities to proactively identify potential threats within the network.
Maintain and update threat intelligence databases and tools.
Liaise with external partners industry groups and government agencies to share and receive threat intelligence.
Provide training and awareness sessions on threat intelligence to internal teams.
Utilize tools such as Recorded Future and Group IB ASM for threat intelligence and analysis.
Perform activities related to weak password authentication and cybersecurity proof of concepts (POCs).
Lead mentor and manage a team of threat intelligence analysts fostering a collaborative and highperformance environment.
Develop and implement team goals objectives and performance metrics.
Strong understanding of cyber threat intelligence frameworks such as MITRE ATT&CK.
Proficiency in using threat intelligence platforms and tools including Recorded Future and Group IB ASM.
Excellent analytical and problemsolving skills.
Strong written and verbal communication skills.
Ability to work independently and as part of a team.
Experience with scripting and automation tools is a plus.
Proven leadership and team management skills.
Any Degree
Relevant certifications such as Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) GIAC Certified Incident Handler (GCIH) or Certified Threat Intelligence Analyst (CTIA) is a plus.
Experience with malware analysis and reverse engineering.
Knowledge of network security and endpoint protection technologies.
Familiarity with cloud security and hybrid environments.
Understanding of regulatory requirements and compliance standards.
Knowhow of tools such as Recorded Future MISP AnyRun ASM OSINT BAS and Qradar
Qualifications :
Certifications such as CISSP CEH GIAC or similar. Experience with vulnerability management frameworks and prioritization methodologies. Understanding of cloud security API security or microservices architecture. Strong analytical and problemsolving skills with attention to detail. Experience with threat hunting and advanced persistent threat (APT) detection. Knowledge of regulatory requirements and standards in cybersecurity.
Remote Work :
Yes
Employment Type :
Fulltime
Remote