At the heart of our client’s defense against cyber threats lies the Security Operations Center (SOC). The SOC is composed of several specialized teams, each playing a crucial role in protecting the organization :
- Cyber Threat Intelligence (CTI) gathers data on potential threats, contextualizes it within the client’s environment, and delivers actionable insights to support decision-making and trigger new alerts.
- Use Case Design ensures that the infrastructure is equipped with the right triggers to detect potential threats.
- Security Analysts (T1 / T2 / T3) investigate alerts when they are triggered.
- Cyber Security Incident Response Team (CSIRT) coordinates the response when alerts escalate into full-scale incidents.
For one of our clients, we are currently looking for a Cyber Threat Intelligence Analyst to join their SOC.
The CTI team supports not only the SOC but also a wide range of stakeholders across the organization, each relying on CTI insights for their specific domains.
Key Challenges for CTI in the Short to Medium Term
Expanding services to existing stakeholdersEstablishing service delivery for new stakeholdersYour Role as a Cyber Threat Intelligence Analyst
As a Cyber Threat Intelligence Analyst , you will provide intelligence on threats and threat actors, assess the risks they pose to the client’s IT environment, and recommend enhancements to security controls.
You will :
Conduct research on emerging threats relevant to the client’s environmentIdentify and classify threat actors and campaignsPrepare and present CTI reports to the internal cybersecurity communityUnderstand the client’s critical IT assets and security controlsCollaborate on threat hunting and use case developmentAnalyze adversary tactics and identify gaps in existing defensesRecommend improvements to the security architectureReview and interpret external threat intelligence sources and reportsSuggest enhancements to detection use cases based on internal and external insightsLiaise with group-level or partner CERT teams to share intelligence and foster collaborationKey Competencies for Success
Strong knowledge of threat impact assessment techniquesExperience supporting use case design and correlation rule developmentFamiliarity with log management and SIEM toolsProficiency with commercial and open-source security tools (e.g., EPP, EDR, SIEM)Skilled in log analysis using regular expressions and natural language queriesUnderstanding of network traffic analysis and packet captureSolid grasp of encryption and cryptographyFamiliarity with frameworks such as MITRE ATT&CK, Kill Chain, or the Diamond Model is a strong plus