We are looking for a Cyber Threat Intelligence Analyst to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers.
We are seeking a motivated cybersecurity professional with a solid foundation in networking and cybersecurity to join our team as a Security Analyst. In this dynamic role, you will engage in various security tasks, from conducting detailed network analysis to developing and validating network signatures and workflows.
You will have the opportunity to collaborate with experienced professionals, contributing to vulnerability assessments, threat detection, and enhancing Cyberints customers security posture.
This position is designed for individuals eager to apply their technical skills in real-world scenarios while growing their expertise in various aspects of cybersecurity. You'll play a key role in our mission to safeguard critical systems.
If you are passionate about cybersecurity, committed to continuous learning, and ready to take on diverse challenges, we encourage you to join our team.
Key Responsibilities
Network Analysis:
Conduct thorough research of network-based vulnerability traffic.
Development & Validation:
Develop, write, review, and validate signatures and templates used for scanning systems for security weaknesses.
Security Assessments:
Assist in performing vulnerability assessments and penetration testing to support ongoing security initiatives.
Collaboration & Reporting:
Work closely with team members to document findings, prepare detailed reports, and recommend actionable remediation steps.
Continuous Learning:
Stay updated on the latest cybersecurity trends, threats, vulnerabilities, and best practices.
Requirements: Technical Expertise:
Solid understanding of networking fundamentals (HTTP/S, TCP/IP, DNS, routing, etc.)
Strong knowledge of cybersecurity principles, including vulnerabilities and exploits
Experience or familiarity with developing and validating network-based signatures
Experience in coding - Python
Experience with code repositories (Git, BitBucket)
Experience with Docker technology - advantage
Hands-on experience with penetration and scanning tools like Metasploit, Nuclei and Nmap - ****advantage
Analytical Skills:
Strong problem-solving skills and keen attention to detail
Ability to analyze complex network data and identify anomalies
Communication:
Practical verbal and written communication skills for transparent reporting and teamwork
This position is open to all candidates.