Cyber Threat Intelligence Analyst (Cloudsek Platform)

3 - 5 years

18 - 22 Lacs

Posted:8 hours ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

What were looking for
    • We are seeking a skilled and proactive Cyber Threat Intelligence Analyst (3-5 years) to join our team and contribute to delivering a Fanatical Experience to our customers.
    • This role is ideal for an individual with a strong background in threat intelligence gathering, analysis, and reporting, as well as hands-on experience in threat hunting and translating intelligence into actionable insights.
    • Incident Handling and Managing Cloudsek Platform.
    • As a Threat Intelligence Analyst, you will be responsible for identifying and analyzing emerging cyber threats, conducting threat hunting (good to have Sentinel Exp) activities to uncover hidden risks, and producing detailed reports to inform and support security operations. Your expertise will help enhance the overall security posture of our customers through proactive intelligence and actionable recommendations.
Key Responsibilities
    • Lead and perform proactive threat hunting across multiple customers or organizational estates using available data and threat intelligence.
    • Create, test, and iterate threat hunting hypotheses to uncover undetected malicious activity.
    • Leverage Cyber Threat Intelligence (CTI) feeds and tooling to track threat actor TTPs and deliver contextual insights relevant to the organization.
    • Design and implement custom detection rules in SIEM platforms, particularly Microsoft Sentinel.
    • Handling Cloud Sek Platform incidents (Dark web detections, Credential Leaks, Compromised Computer.)
    • Collaborate with detection engineers, SOC analysts, and other stakeholders to improve detection content and response workflows.
    • Contribute to incident response activities by supporting triage, investigation, and root cause analysis of cybersecurity events.
    • Support risk and threat modelling initiatives by providing timely threat input and context.
    • Deliver timely high-quality reporting (including executive briefings and technical analysis) on emerging threats and threat actor trends.
    • Manage and curate threat intelligence watchlists, enrich detections with threat data, and assist SOC teams with relevant contextual insights.
    • Support insider threat monitoring and vulnerability risk assessments.
    • Participate in detection engineering efforts by identifying opportunities for new or enhanced analytics.
    • Communicate threat relevance to technical and non-technical stakeholders clearly and concisely.
    • Maintain an active awareness of the evolving cyber threat landscape, particularly as it pertains to your sector.
    • Liaise with Corporate Enterprise Security for indicator and threat sharing.
    • Drive iterative non-technical process improvement and documentation to minimize process friction to eliminate waste and drive consistency.
Essential Skills and Experience
    • Experience in Threat Hunting and Cyber Threat Intelligence. (3-5 years)
    • Experience in analyzing large datasets for threat patterns.
    • Strong understanding of threat actor behaviours, attack chains, and TTPs.
    • Practical experience using SIEM platforms (ideally Microsoft Sentinel) and writing KQL queries.
    • Strong Handon on Exp on Cloud Sek Platform,
    • Understanding of threat modelling, risk management, and MITRE ATT&CK framework.
    • Experience supporting or collaborating with Security Operations Center (SOC) teams.
    • Understanding of Windows and/or Linux telemetry and analysis techniques.
    • Knowledge of network protocols and how they may be exploited.
    • Experience executing security incident response workflows and processes.
    • Ability to triage and respond to threat intelligence alerts from multiple sources.
    • Strong written and verbal communication skills to effectively deliver technical and executive-level briefings.
Desirable Skills
    • Experience with Microsoft Defender XDR Suite (Defender for Cloud, Server, Endpoint, Office 365, Identity).
    • Microsoft Sentinel
    • Cloud SEK Platform
    • Crowdstrike, Falcon
    • Qualys
    • Familiarity with Microsoft Entra, Purview, and Azure technologies.
    • Knowledge of NIST CSF, and other common security frameworks.
    • Experience working with STIX and TAXII or equivalent for TI normalization and sharing
    • Hands-on experience with detection creation and automation workflows using GitHub.
    • Familiarity with scripting (python, JS, Powershell) for automation/analysis data processing.
    • Experience working in Agile environments and cross-functional teams.
    • Relevant certifications such as:
    • Microsoft: SC-200, AZ-500, MS-500, SC-300
    • GIAC: GCTI, GCFA, GREM, GCIA
    • Other: CISSP, CISA, CISM, CompTIA Security+/Cloud+, CCSK

Mock Interview

Practice Video Interview with JobPe AI

Start JavaScript Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Javascript Skills

Practice Javascript coding challenges to boost your skills

Start Practicing Javascript Now
Rackspace Technology logo
Rackspace Technology

Cloud Computing

San Antonio

RecommendedJobs for You

mumbai, mumbai (all areas)