
Search by job, company or skills
Key Responsibilities
The CTI Analyst will be responsible for a range of activities, including:
Intelligence Production: Contributing to the production of high-quality, English-language Threat Intelligence reports and briefings for clients and internal groups (e.g., CSIRT, RTSM, RED TEAM).
Executive Reporting: Preparing concise context reports for management, distilling complex information into strategic insights.
Alert Triage & Reporting: Monitoring and analyzing alerts from automated systems, producing relevant intelligence reports based on findings.
Briefings & Presentations: Developing and presenting tactical, operational, and strategic reports and presentations in English.
Client Engagement: Conducting briefings in English for CTI service clients.
Geopolitical Monitoring: Proactively monitoring the geopolitical landscape and its correlation with cyber threats.
Threat Actor Tracking: Tracking top-tier Threat Actors (TTPs, infrastructures, victims, etc.) to address specific Intelligence Requirements.
Incident Support: Working closely with other security teams (e.g., Incident Response) during specific threats and vulnerabilities.
Automation: Contributing to the automation of CTI tradecraft and processes to enhance intelligence production efficiency.
Malware Analysis Support: Interpreting the results of malware analysis tools and escalating to the dedicated malware analysis/reverse engineering team when necessary.
Required Qualifications
Experience Level
At least 3 years of documented experience in CTI
Education
Bachelor's or Master's Degree in Computer Science, Computer Engineering, or equivalent (Specialization in Cyber Security is a plus).
Bachelor's or Master's Degree in International Relations (with demonstrable competence in Cyber Security).
Language Skills
Excellent written and spoken English proficiency (B2 level or higher is mandatory).
Technical Knowledge & Skills
Demonstrated experience in academic and/or scientific writing.
Solid understanding of the contemporary and historical geopolitical scenario and context.
Knowledge of the Intelligence Cycle and Intelligence Analysis methodologies.
Applied knowledge of Open Source Intelligence (OSINT) techniques.
Familiarity with foundational models: Diamond Model and the Cyber Kill Chain.
Working knowledge of the MITRE ATT&CK Framework.
Programming/Scripting skills, preferably Python is a plus.
Experience with Python for data analysis (e.g., Pandas) is a plus.
Other Requirements
Shift Work: Availability to work on shift patterns (H16: 8:00-14:00, 14:00-22:00).
Travel: Availability for short-term domestic and international travel.
Salary Range
RM4,000 - RM6,000
Job ID: 135580295