About the Role
This role involves identifying emerging threats, analyzing adversary behavior, and translating technical findings into strategic insights for clients and internal teams.
Responsibilities
- Conduct in-depth analysis of advanced cyber threats and threat actors
- Produce timely, actionable intelligence reports for technical and executive audiences
- Monitor global threat landscapes for emerging tactics, techniques, and procedures
- Support incident response with threat context and attribution insights
- Collaborate with security teams to enhance detection and prevention capabilities
- Develop and maintain threat intelligence frameworks and methodologies
- Present findings to stakeholders across technical and management levels
- Contribute to threat modeling and risk assessment initiatives
- Engage in proactive threat hunting using open-source and proprietary data
- Maintain up-to-date knowledge of cybersecurity trends and vulnerabilities
- Assist in the development of automated intelligence collection processes
- Evaluate threat relevance to specific industries or client environments
- Participate in intelligence sharing communities and forums
- Support red team exercises with real-world adversary emulation data
- Ensure compliance with legal and ethical standards in intelligence gathering
Nice to Have
- Master's degree in a relevant technical discipline
- Experience working in government or defense-related cybersecurity roles
- Track record of publishing threat intelligence research
- Active participation in cybersecurity conferences or working groups
- Hands-on experience with SIEM or SOAR platforms
- Knowledge of cloud security threats and architectures
- Familiarity with dark web monitoring techniques
- Experience mentoring junior analysts
- Additional language proficiency
Compensation
Competitive salary based on experience
Work Arrangement
Hybrid or remote options available
Team
Collaborative security-focused team environment
What We Offer
- Opportunities for professional growth and certification support
- Involvement in high-impact cybersecurity projects
- Flexible working arrangements with remote options
- Access to cutting-edge security tools and research resources
- A culture that values curiosity, integrity, and collaboration
Application Process
- Submit your resume and a brief cover letter
- Include examples of published work or writing samples if available
- Shortlisted candidates will be contacted for a technical interview
- Final stage includes a practical assessment of analytical skills
Available for qualified candidates