Ref: #64914

Threat Intelligence Analyst

Summary Description:
Cyber Threat Intelligence Analyst, specializing in the collection, processing, analysis, and dissemination of cyber threat intelligence. The role involves working with various frameworks, tools, and platforms to deliver actionable intelligence for the organization.

Role Type: Contract - 6months + ext

Start Date: Immediate

Salary: Day Rate + travel Expenses

Location/Language:
Remote - 5 days a month in Frankfurt / [English]

Requirements Description:

  • Relevant certifications (e.g., GCTI, GOSI, CTIA) or equivalent in Cyber Threat Intelligence.
  • Experience in threat data collection, enrichment, and analysis.
  • Proficiency with cyber threat intelligence frameworks like MITRE ATT&CK, Cyber Kill Chain, and Diamond Model.
  • Hands-on experience with Collaborative Platforms (MISP, CRITs), Threat Intelligence Platforms (Anomali, RecordedFuture, CybelAngel), and Investigation tools (Maltego, VirusTotal, etc.).
  • Experience with SIEM and SOAR tools (e.g., Splunk, IBM QRadar, Palo Alto XSOAR).

Tasks Description:

  • Collect and process cyber threat data from various sources.
  • Analyze and enrich the collected information to generate actionable threat intelligence.
  • Develop threat intelligence products tailored to different audiences.
  • Disseminate intelligence reports and findings in various formats (e.g., dashboards, documents).
  • Use structured analytic techniques for identifying trends and providing threat assessments.
  • Collaborate with teams for threat analysis and incident response.

Essential Skills/Experience Description:

  • Strong understanding of the Cyber Kill Chain, MITRE ATT&CK Framework, and Diamond Model.
  • Proficiency in using commercial threat intelligence platforms (Anomali, RecordedFuture) and open-source intelligence tools (e.g., MISP, CRITs).
  • Experience with Intelligence Analyst Investigation tools (Maltego, VirusTotal, ThreatQuotient, etc.).
  • Familiarity with SIEM platforms like Splunk and IBM QRadar, and SOAR platforms such as Palo Alto XSOAR.
  • Ability to synthesize and deliver clear and actionable intelligence.

Desirable Skills/Additional Information Description:

  • Experience in managing and distributing IoCs (Indicators of Compromise).
  • Knowledge of automated threat intelligence platforms.
  • Previous work in high-pressure environments with tight deadlines.
  • Familiarity with incident response processes and working with security operations teams.

Team Contact:jude.russell@next-ventures.com

Attach a resume file. Accepted file types are DOC, DOCX, PDF, HTML, and TXT.

We are uploading your application. It may take a few moments to read your resume. Please wait!