Threat Research Analyst

1 - 3 years

4 - 8 Lacs

Posted:1 week ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

About the Role

Threat Research Analyst

Key Responsibilities

  • Monitor and analyze global cyber threats, vulnerabilities, malware, and attack campaigns.
  • Conduct

    threat intelligence research

    using OSINT, dark web monitoring, and proprietary tools.
  • Perform malware analysis, reverse engineering, and sandboxing to understand threat behavior.
  • Collaborate with SOC, Incident Response, and Security Engineering teams to detect, analyze, and respond to threats.
  • Develop threat reports, threat intelligence briefs, and actionable recommendations for stakeholders.
  • Maintain and update threat databases, indicators of compromise (IOCs), and MITRE ATT&CK mappings.
  • Track emerging attack techniques, tools, and campaigns, and assess their potential impact on the organization.
  • Support vulnerability assessments, penetration testing, and red/blue team exercises with threat insights.
  • Provide training and awareness sessions on threat trends to internal teams.
  • Evaluate and recommend threat intelligence platforms, tools, and automation frameworks.

Required Skills & Qualifications

  • Bachelor’s degree in

    Computer Science, Cybersecurity, Information Technology

    , or related field.
  • 2–6 years of experience in

    cybersecurity, threat intelligence, or SOC operations

    .
  • Strong understanding of

    cyber threat landscape

    , attack vectors, malware families, and exploitation techniques.
  • Hands-on experience with:
    • Threat intelligence platforms (MISP, ThreatConnect, Recorded Future, Anomali)
    • Malware analysis tools (Cuckoo Sandbox, IDA Pro, Ghidra)
    • Network and endpoint security tools (SIEM, EDR, Firewalls)
  • Knowledge of

    MITRE ATT&CK

    ,

    TTPs

    , and

    IOC creation

    .
  • Familiarity with

    Python, PowerShell, Bash, or other scripting languages

    for analysis and automation.
  • Understanding of

    network protocols, TCP/IP, HTTP, DNS, and malware communication patterns

    .
  • Strong analytical, research, and communication skills.

Nice-to-Have

  • Experience with

    APT tracking and nation-state threat actors

    .
  • Certifications such as

    GIAC Cyber Threat Intelligence (GCTI)

    ,

    Certified Threat Intelligence Analyst (CTIA)

    , or

    CEH/GSEC

    .
  • Knowledge of cloud security (AWS, Azure, GCP) and related threats.
  • Exposure to

    digital forensics, reverse engineering, or sandboxing

    .
  • Experience with

    SOC automation, threat hunting, or SIEM rule development


Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now
ti Steps logo
ti Steps

Staffing and Recruiting

Frankfurt Germany

RecommendedJobs for You

hyderabad, chennai, bengaluru

bengaluru, karnataka, india

bengaluru, karnataka, india

bengaluru, karnataka, india