Search by job, company or skills
Responsibilities:
Monitor third party security feeds, forums, and mailing lists to gather information related to the client through automated means
Produce intelligence outputs to provide an accurate depiction of the current threat landscape and associated risk through the use of customer, community, and open source reporting
Produce actionable intelligence information for delivery to colleagues and customers in the form of technical reports, briefings, and data feeds
Review vulnerabilities advisories
Review and process threat intelligence reports
Perform detailed investigative works into all traffic anomalies against established, historical baselines of individual agencies. Reviewing and profiling the events of all monitored clients
Assess each event based on factual information and wider contextual information available
Review, propose and generate reports to automate or reduce low value event escalations
Build rules and intelligence to detect such threats and proliferate to all monitored networks
Implementing and devising detection method of such threats in our security operations through SIEM Rules, DB scripts etc
Perform periodic analysis of security events, network traffic, and logs to engineer new detection methods, or create efficiencies when available
Supports the development of tactics, techniques, and procedures in providing proactive threat hunting and analysis against the available information sources (e.g. Netflow, DNS and Firewall logs, etc.)
Assist the Security Analysts with the investigative works
Prepare training programme for Security Analyst and conduct knowledge sharing sessions for Security Analyst
Fulfil Change Requests, Service Requests and respond to internal / external enquiries with regards to detection Use Case
Any other tasks as assigned
Requirements:
Degree holder with at least 5 years of experience in related field and capacity
Prior experience working in a Security Operations Centre (SOC) or Computer Emergency Response Team (CERT/CIRT)
Possessed deep interest in open source research and critical thinking / contextual analysis abilities Investigative and analytical problem solving skills
An understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security
Related professional cyber security certification, such as GCIA, CEH, will be preferred
Experience with intelligence analysis processes, including Open Source Intelligence (OSINT) and closed source intelligence gathering, source verification, data fusion, link analysis, and threat actor
Ability to research and characterize security threats to include identification and classification of threat indicators
Date Posted: 10/05/2025
Job ID: 112310367