Threat Intelligence Analyst

 

Recruiter:

HR Genie

Job Ref:

LM_TIA

Date posted:

Thursday, April 28, 2022

Location:

Midrand, South Africa

Salary:

Market related


SUMMARY:
The role extends further by providing trusted advisory security expertise to the customer in making

JOB DESCRIPTION:

Formal Education

         •   BSC degree in relevant field/technology (or equivalent years of experience) 

 

Experience

  • minimum of 4 years of related experience
  • Experience with threat assessment, vulnerability analysis, risk assessment, information gathering, correlating and reporting
  • Experience analysing phishing attacks
  • Significant experience in network intrusion detection
  • Experience creating specific mitigation tactics such as IDS signatures
  • Experience producing reports and briefs on the current threat landscape and associated risks
  • Experience with conducting vulnerability assessments using tools like Tenable or similar
  • Experience on threat intelligence feeds in terms of application and usability
  • Experience monitoring third party security related websites, forums and social media sites for information regarding vulnerabilities and exploits
  • Experience conducting malware analysis - usage of VirusTotal etc
  • Experience using common sandbox technologies to perform dynamic malware analysis
  • Experience replicating reported vulnerabilities in a safe and contained environment to develop proof of concept and/or exploit tools

Technical/Legal Certification

  • CISSP, CEH, GPEN, OSCP or similar security certifications 
  • Certification in IBM Qradar essential

Responsibilities

• Supports the Threat and Advanced Cyber Defence Team with reporting, management, and remediation of threats against customers.

  • Conduct cyber intelligence operations including intelligence collection, tracking threat actors, identifying malicious behaviours and operations.
  • Participates on Incident Response teams as threat/forensic SME (Subject Matter Expert)
  • Perform network traffic and anomaly analysis, as well as indicators of compromise from system logs (Unix & Windows), application/database and firewall logs, IDS/IPS alerts, WAF alerts, endpoint malware alerts.
  • Manages multiple investigation requests through the entire lifecycle of initiation, data collection, analysis, and data production
  • Performs assessments of security profiles and correlates vulnerability data with network topology information to quickly identify risks
  • Recommends and tracks the application of fixes, security patches and security updates on various levels
  • Produces recommendation reports on patches, exploits and vulnerabilities
  • Works with customers, vendors and internal resources for problem resolution and security advisories
  • Standardizes process and procedures and provides continual improvement
  • Develops and maintain comprehensive documentation on incidents and analysis for clients and internal
  • Compile security advisories for internal and external in document format with technical recommendations
  • Use case writing, development and refinement for detection of threats
  • Proactively search for rogue behaviour, malicious attacks & suspicious activity
  • Training of junior analysts
  • Analyse threat feeds to produce daily/weekly/monthly Threat Intelligence brief and regular threat trend reporting

 

Key Competencies

Knowledge

  • Ability to identify and recommend mitigations for vulnerabilities, exploits, patches
  • Understanding of "attacker" methodologies and tactics, including kill-chain analysis
  • Familiarity with Advance Persistent Threat groups and Hacker activity
  • Construct correlation and application rules in a SIEM environment from use cases
  • Knowledge of cyber security methodology and security best practices •            Familiar with Data Privacy laws and the associated security requirements. 

Skills 

  • Excellent problem solving and analytical skills
  • Excellent written and oral communication skills
  • Strong security research skills on hackers, threats and the attack surface at a global and local level
  • Programming skills required: Python, Java, Perl
  • Ability to read network logs and analyse network packet capture data. Wireshark
  • Ability to perform malicious code reverse engineering (advantageous)
  • Ability to utilize common sandbox technology to perfor

 

NB! This job is now closed. You can apply for other jobs by uploading your CV.



 

 

 

Similar jobs you might be interested in:

Information Security Manager
Location: Midrand
Salary:
Ready to code your way into the future? Join a team that’s redefining how ads find you—where location meets innovation. If you’re passionate about building next-gen web applications and thrive in high-traffic, real-time environments, this is your playground
5 days ago


SOC Manager
Location: Midrand
Salary:
5 days ago


Information Security Manager
Location: Midrand
Salary:
Cybersecurity is not just about tools, it is about strategy, leadership and staying one step ahead. Our client is looking for a Information Security Manager to lead their cybersecurity strategy, governance, and operations across a modern hybrid environment.
6 days ago


Cyber Security Lead
Location: Johannesburg
Salary: market related Monthly
Summary of role:This role is accountable for the detection, response and recovery services related to Cyber Security. It is a temporary role which will hand over to the final permanent candidate that will be in place by the end of this contract. The individual would need to manage cyber related threats (actual or perceived), as well as be able to build and sustain a team that addresses these threa...
12 days ago


Senior Information Security Engineer
Location: Johannesburg
Salary: Market Related Monthly
Purpose:The Senior Information Security Engineer is a strategic technical leader responsible for designing, implementing, and optimizing advanced security architectures across the company’s hybrid infrastructure, applications, and cloud environments. This role drives security engineering initiatives, mentors junior engineers, leads complex incident response efforts, and ensures compliance wi...
12 days ago


Information Security Manager
Location: Johannesburg
Salary: Market Related Monthly
Job Description:The Information Security Manager will lead our client’s cybersecurity strategy, governance, and operations across a hybrid cloud infrastructure. This includes managing Microsoft security capabilities, integrating firewall technologies, overseeing the Cyber Security Operations Center (SOC), and ensuring compliance with regulatory and industry standards. The role also includes ...
12 days ago


Senior Information Security Engineer
Location: Johannesburg
Salary: 1 Monthly
Senior Information Security Engineer
13 days ago


Information Security Manager
Location: Johannesburg
Salary: Annually
The Information Security Manager will lead our client’s cybersecurity strategy, governance, and operations across a hybrid cloud infrastructure. This includes managing Microsoft security capabilities, integrating firewall technologies, overseeing the Cyber Security Operations Center (SOC), and ensuring compliance with regulatory and industry standards. The role also includes managing BYOD ri...
13 days ago


L2 System Engineer
Location: Sunninghill
Salary:
Our client is seeking a highly skilled L2 Systems Engineer to join their company in Gauteng. This role requires an experienced professional who can lead technical initiatives, drive the transition toward proactive, data-driven and intelligence-led IT services, and ensure strict regulatory and cybersecurity compliance within a Managed intelligence Platform (MIP) environment.
27 days ago


Bunisess Intelligence Pecialist
Location: Johannesburg
Salary:
We are recruiting for a Business intelligence Tester role.
6 days ago


Create a free job alert for Threat Intelligence Analyst in Midrand

Enter your email address below and we will email you similar jobs when they become available:

You can cancel at any time. We will not spam you.
By giving us your email address your agree to our Terms and Conditions