Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
About the Role
As a Cyber Threat Intelligence Analyst, you will transform raw threat data into actionable intelligence that empowers teams across our client's enterprise. Your insights will help guide decision-making, support threat detection strategies, and enhance our overall security posture.
What You’ll Do
You will play a crucial role in identifying and analyzing threats, understanding their impact, and recommending improvements to our client's defenses.
Your responsibilities include:
- Researching emerging cyber threats relevant to the organization
- Identifying, profiling, and tracking threat actors and campaigns
- Creating and presenting CTI reports for our cybersecurity community
- Understanding critical IT assets and supporting the enhancement of security controls
- Collaborating on threat hunting initiatives and use case development
- Analyzing adversary behaviors and detecting defensive gaps
- Recommending improvements to security architecture and detection logic
- Reviewing and interpreting external threat intelligence reports
- Working closely with the Group CERT to exchange intelligence and strengthen collaboration
Key Competencies
We’re looking for someone who brings technical strength and analytical curiosity, including:
- Strong threat impact assessment skills
- Experience supporting use case design and correlation rules
- Familiarity with log management and SIEM platforms
- Proficiency with security tooling such as EPP, EDR, and SIEM technologies
- Skill in log analysis using regular expressions or natural language querying
- Understanding of network traffic analysis and packet capture
- Solid knowledge of encryption and cryptography
- Bonus: familiarity with MITRE ATT&CK, the Cyber Kill Chain, or the Diamond Model
Key Skills
Ranked by relevanceReady to apply?
Join Koda Staff and take your career to the next level!
Application takes less than 5 minutes

