Cyber Threat Intelligence Analyst
V-IT
Kortenberg, Belgium
4 days ago
Role details
Contract type
Permanent contract Employment type
Full-time (> 32 hours) Working hours
Regular working hours Languages
EnglishJob location
Kortenberg, Belgium
Tech stack
Computer Security
Computer Networks
Computer Telephony Integration
Log Analysis
Packet Analyzer
Open Source Technology
Regular Expressions
Security Information and Event Management
Mitre Att&ck
Cyber Threat Analysis
Information Technology
Job description
Join our Security Operations Center (SOC) as a Cyber Threat Intelligence Analyst. You will be at the forefront of our defense strategy, providing intelligence on threats and threat actors, assessing risks to our IT environment, and recommending enhancements to our security controls. The role involves supporting the SOC and a wide range of stakeholders across the organization., * Conduct research on emerging threats relevant to the organization.
- Identify and classify threat actors and campaigns.
- Prepare and present Cyber Threat Intelligence (CTI) reports to the cybersecurity community.
- Understand critical IT assets and security controls.
- Collaborate on threat hunting and use case development.
- Analyze adversary tactics and identify gaps in defenses.
- Recommend improvements to security architecture.
- Review and interpret external threat intelligence sources and reports.
- Suggest enhancements to detection use cases based on internal and external insights.
Requirements
- Strong knowledge of threat impact assessment techniques.
- Experience supporting use case design and correlation rule development.
- Familiarity with log management and SIEM tools.
- Proficiency with commercial and open-source security tools (e.g., EPP, EDR, SIEM).
- Skilled in log analysis using regular expressions and natural language queries.
- Understanding of network traffic analysis and packet capture.
- Solid grasp of encryption and cryptography.
- Familiarity with frameworks like MITRE ATT&CK, Kill Chain, or the Diamond Model is a strong plus.
Ideal Profile:
- Passionate about cybersecurity.
- Strong understanding of IT infrastructure.
- Skilled at building partnerships with new stakeholders.
- Excellent at researching and synthesizing information.
- Able to communicate clearly and effectively to diverse audiences.