Senior Level - Threat Intel Analyst

8 - 13 years

10 - 15 Lacs

Posted:3 weeks ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

A total of 8 years of professional experience, including 5 years in Security Operations Center (SOC) operations and 3 years in Cyber Threat Intelligence (Surface, Deep Dark Web). Mandatory hands-on experience with at least one Digital Risk Protection(Brand Intelligence Platforms) (eg, RecordedFuture, GroupIB, Mandiant, CrowdStrike Falcon Intelligence (Recon+, Elite), Zerofox, Intsights, Cyble, Cloudsek, Cyfirma, SocRadar, Digital Shadows). Mandatory hands-on experience with at least one Threat Intelligence Platform (TIP) (eg, ThreatConnect, Anomaly, ThreatQuotient, Cyware, Palo Alto TIM). Knowledge on Attack Surface Management tools like Bitsight, Security scorecard, etc Excellent written and verbal communication skills for report writing and stakeholder presentations. Ability to identify, track, and analyze emerging cyber threats, threat actors, and attack vectors relevant to the organizations industry and environment. Proficient in analyzing suspicious files/sandboxing using tools such as VirusTotal, Hybrid Analysis, Cuckoo, Any.run, Intezer, and Joe Sandbox. Expertise in monitoring and analyzing threat intelligence across various sources, including Open Source Intelligence (OSINT), Deep Dark Web forums, commercial and open-source threat feeds, and security vendor reports. Strong understanding of cyber threat actors, tactics, techniques, and procedures (TTPs), leveraging frameworks such as MITRE TelecommunicationCK, Cyber Kill Chain, Diamond Intrusion Model, and CREST Cyber Threat Intelligence Framework. Skilled in analyzing vulnerabilities and exploits that are actively used and providing insights for patching and mitigation efforts. Capable of monitoring cyber threat landscapes, including geopolitical developments and threat actor activities. Experience in preparing and presenting intelligence reports related to threat trends, zero-day vulnerabilities, and supply chain attacks to stakeholders, highlighting significant threats and recommended actions. Ability to produce actionable intelligence reports, threat briefs, and strategic assessments to inform leadership and technical teams. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or GIAC Cyber Threat Intelligence (GCTI) are preferable. Secondary Skills Knowledge of various malware mitigation strategies, including prevention, detection, removal, recovery, and response. Familiarity with query structures such as Regular Expressions, YARA and SIGMA rules, AQL, and KQL. Basic understanding of programming languages, specifically Java and Python. Preferred knowledge of Malware Analysis Techniques: Static Dynamic analysis, code analysis, behavioral analysis, and forensic analysis. Understanding and knowledge of different security technologies like SOAR, Attack Surface Management, Web Application Firewalls (WAF), DNS, DMARC, and Vulnerability Management. Knowledge of Threat Hunting and Digital Forensics and Incident Response (DFIR) is preferable. Tertiary skills Automation Any other skills required Strong analytical and problem-solving skills, Proactive approach, self-motivated Domain Cyber Sec

Mock Interview

Practice Video Interview with JobPe AI

Start Supply Chain Interview Now

My Connections Clifyx Technology

Download Chrome Extension (See your connection in the Clifyx Technology )

chrome image
Download Now
Clifyx Technology
Clifyx Technology

Technology

Innovation City

50-100 Employees

484 Jobs

    Key People

  • Jane Doe

    CEO
  • John Smith

    CTO

RecommendedJobs for You