156 Competitive Intelligence jobs in Bahrain
Cyber Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Collect, process, and analyze threat data from various sources, including open-source intelligence (OSINT), commercial feeds, and internal security telemetry.
- Identify and track threat actors, their tactics, techniques, and procedures (TTPs), and their motivations.
- Develop and maintain intelligence reporting, including strategic, operational, and tactical threat assessments.
- Provide timely and relevant threat intelligence to security operations, incident response, and vulnerability management teams.
- Correlate threat intelligence with internal security events to enhance detection and response capabilities.
- Build and maintain relationships with external threat intelligence sharing communities and partners.
- Develop and refine intelligence collection requirements and methodologies.
- Create visualizations and dashboards to communicate complex threat data effectively.
- Support incident response activities by providing context and indicators of compromise (IOCs).
- Contribute to the development and improvement of threat hunting hypotheses and playbooks.
- Stay abreast of the latest cybersecurity threats, vulnerabilities, and trends affecting the organization and its industry.
- Conduct research on emerging technologies and their implications for cybersecurity.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, International Relations, or a related analytical field.
- Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence, analysis, or cybersecurity operations.
- Proven experience in collecting, analyzing, and reporting on threat intelligence.
- Strong understanding of various threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
- Proficiency with threat intelligence platforms (TIPs), SIEM tools, and data analysis techniques.
- Familiarity with programming or scripting languages (e.g., Python) for data analysis is a plus.
- Excellent research, analytical, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to convey technical information clearly to diverse audiences.
- Ability to work independently and manage multiple research projects concurrently.
- Relevant certifications such as GIAC Certified Cyber Threat Intelligence (GCTI) or similar are highly desirable.
Cybersecurity Threat Intelligence Analyst
Posted 4 days ago
Job Viewed
Job Description
Key responsibilities include:
- Collecting and analyzing threat intelligence data from various sources (e.g., open-source, dark web, internal logs).
- Identifying emerging threats, vulnerabilities, and attack vectors relevant to the organization.
- Developing and maintaining threat actor profiles and campaign analysis.
- Producing actionable threat intelligence reports and briefings for security teams and leadership.
- Collaborating with incident response teams to provide context and support during security incidents.
- Developing and tuning threat detection rules and indicators of compromise (IOCs).
- Evaluating and recommending threat intelligence platforms and tools.
- Contributing to the development of the organization's overall cybersecurity strategy.
- Participating in threat hunting exercises and exercises.
Senior Threat Intelligence Analyst
Posted 4 days ago
Job Viewed
Job Description
Cyber Threat Intelligence Analyst
Posted 12 days ago
Job Viewed
Job Description
Key Responsibilities:
- Collect, analyze, and interpret cyber threat intelligence from various sources.
- Identify and track threat actors, their TTPs, and motivations.
- Develop actionable threat intelligence reports, briefings, and alerts.
- Conduct threat hunting activities to proactively identify malicious activity.
- Integrate threat intelligence into security tools and workflows (SIEM, SOAR, Firewalls).
- Support incident response investigations with relevant threat context.
- Develop and maintain relationships with information sharing groups and threat intelligence communities.
- Contribute to the improvement of threat detection and prevention capabilities.
- Provide expertise on emerging threats and vulnerabilities to relevant teams.
- Analyze malware samples and provide technical analysis.
- Bachelor's degree in Cybersecurity, Computer Science, or a related field.
- Minimum of 4 years of experience in cybersecurity, with a focus on threat intelligence or incident response.
- Proven experience in collecting and analyzing threat data from diverse sources.
- Strong understanding of threat actor TTPs, attack vectors, and cyber kill chain.
- Experience with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
- Knowledge of malware analysis techniques and tools.
- Excellent analytical, critical thinking, and communication skills.
- Relevant certifications such as GCTI, CTI, or Security+ are a plus.
Senior Cybersecurity Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze open-source intelligence (OSINT), dark web forums, and closed sources for indicators of compromise (IOCs) and threat actor activity relevant to the organization.
- Develop and maintain a deep understanding of current and emerging cyber threats, attack vectors, and TTPs used by various threat actor groups.
- Conduct in-depth research and analysis on malware, phishing campaigns, ransomware attacks, and other cyber threats.
- Produce timely and actionable threat intelligence reports, briefings, and alerts for various stakeholders, including security operations, incident response, and executive leadership.
- Develop and manage threat intelligence platforms and tools to automate data collection, analysis, and dissemination.
- Collaborate with internal security teams (SOC, IR, vulnerability management) to integrate threat intelligence into defensive strategies and operations.
- Build and maintain relationships with external threat intelligence communities, government agencies, and industry partners.
- Support incident response efforts by providing timely and relevant threat context.
- Identify gaps in current security controls based on threat intelligence and recommend improvements.
- Contribute to the development and refinement of threat hunting methodologies.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Master's degree or equivalent experience is a plus.
- Minimum of 5 years of experience in cybersecurity, with a specialization in threat intelligence, security operations, or incident response.
- Proven experience in analyzing various types of threat data (IOCs, TTPs, malware analysis, network traffic).
- Familiarity with threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
- Proficiency in scripting languages (e.g., Python) for data analysis and automation.
- Strong understanding of networking protocols, operating systems, and security technologies (firewalls, IDS/IPS, SIEM).
- Excellent research, analytical, and critical thinking skills.
- Exceptional written and verbal communication skills, with the ability to articulate complex technical concepts clearly.
- Ability to work independently and as part of a distributed, remote team.
Senior Cybersecurity Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Collect, analyze, and interpret data from various sources to identify emerging threats and trends.
- Develop and maintain intelligence reports, including indicators of compromise (IOCs) and tactical, operational, and strategic threat assessments.
- Provide timely and actionable intelligence to security operations and incident response teams.
- Track and analyze threat actor tactics, techniques, and procedures (TTPs).
- Develop and manage threat intelligence platforms and tools.
- Conduct research on new attack vectors, malware, and cyber threats.
- Build relationships with external threat intelligence communities and information sharing groups.
- Develop and present threat briefings to technical and non-technical audiences.
- Contribute to the development of security playbooks and incident response procedures.
- Mentor junior analysts and contribute to team development.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, or a related field, or equivalent practical experience.
- 5+ years of experience in cybersecurity, with a specialization in threat intelligence.
- Demonstrated experience with threat intelligence platforms (e.g., Anomali, Recorded Future), SIEM, and malware analysis tools.
- Strong understanding of cyber threat frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
- Excellent analytical, critical thinking, and problem-solving skills.
- Proficiency in scripting languages (e.g., Python) is a plus.
- Strong written and verbal communication skills.
- Ability to work independently and collaboratively in a remote environment.
- Relevant certifications (e.g., GCTI, CISSP) are highly desirable.
Senior Cybersecurity Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze various threat intelligence sources, including open-source intelligence (OSINT), dark web forums, government advisories, and vendor reports, to identify emerging threats and attack vectors relevant to our industry.
- Develop and maintain threat profiles for relevant threat actors, campaigns, and malware families.
- Conduct in-depth research and analysis of malware, phishing campaigns, and exploitation techniques.
- Produce timely and actionable threat intelligence reports, briefings, and alerts for technical and non-technical audiences, including executive leadership.
- Collaborate with incident response teams to provide contextual information and support during security incidents.
- Develop and implement threat intelligence platforms and tools to automate collection, analysis, and dissemination of intelligence.
- Build and maintain relationships with external threat intelligence sharing communities and information partners.
- Advise on security controls, policies, and procedures based on threat intelligence findings.
- Mentor junior analysts and contribute to the development of the team's overall capabilities.
- Stay abreast of the latest cybersecurity trends, vulnerabilities, and attack methodologies.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence, malware analysis, or incident response.
- Demonstrated expertise in analyzing various types of threat intelligence data (e.g., indicators of compromise, TTPs, threat actor profiles).
- Proficiency with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
- Strong understanding of common attack frameworks (e.g., MITRE ATT&CK) and their application.
- Experience with malware analysis tools and techniques (static and dynamic).
- Excellent written and verbal communication skills, with the ability to present complex information clearly and concisely.
- Relevant certifications such as GIAC Certified Cyber Threat Intelligence (GCTI), CISSP, or equivalent.
- Ability to work independently and as part of a collaborative team in a fast-paced environment.
- Strong problem-solving and analytical skills.
Be The First To Know
About the latest Competitive intelligence Jobs in Bahrain !
Senior Cybersecurity Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze global cyber threat intelligence feeds, open-source intelligence (OSINT), and proprietary data sources to identify emerging threats and trends.
- Conduct in-depth research on threat actors, their TTPs (Tactics, Techniques, and Procedures), motivations, and infrastructure.
- Develop and disseminate high-quality threat intelligence reports, alerts, and briefings to relevant stakeholders, including security operations teams and executive leadership.
- Correlate threat intelligence with internal security event data to identify and prioritize potential risks.
- Develop and maintain detection rules, indicators of compromise (IOCs), and threat hunting hypotheses based on intelligence findings.
- Collaborate with Security Operations Center (SOC) analysts, incident response teams, and security engineering to integrate threat intelligence into defensive measures.
- Contribute to the development and refinement of the threat intelligence platform and processes.
- Build and maintain relationships with external threat intelligence communities and information sharing groups.
- Provide expert guidance on threat landscape evolution and recommend strategic improvements to security defenses.
- Mentor junior analysts and contribute to the team's knowledge base.
- Stay current with the latest cybersecurity threats, vulnerabilities, and attacker techniques.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field; Master's degree is a plus.
- Minimum of 5 years of experience in cybersecurity, with at least 3 years focused on threat intelligence analysis.
- Proven experience in analyzing various types of cyber threat data (malware, network traffic, vulnerability reports, etc.).
- Strong understanding of threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
- Proficiency in utilizing threat intelligence platforms, SIEM tools, and data analysis tools.
- Excellent research, analytical, and critical thinking skills.
- Demonstrated ability to produce clear, concise, and actionable intelligence reports.
- Familiarity with scripting languages (e.g., Python) for data analysis and automation is advantageous.
- Strong communication and presentation skills.
Senior Cybersecurity Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze the global threat landscape, identifying emerging threats, adversary tactics, techniques, and procedures (TTPs).
- Develop and disseminate timely and actionable threat intelligence reports to inform security operations, incident response, and risk management strategies.
- Conduct in-depth research on specific threat actors, malware campaigns, and vulnerabilities relevant to our clients' industries.
- Utilize a variety of intelligence sources, including open-source intelligence (OSINT), commercial feeds, dark web monitoring, and human intelligence (HUMINT).
- Develop and refine indicators of compromise (IOCs) and associated detection rules for security monitoring tools (e.g., SIEM, EDR, IDS/IPS).
- Collaborate with security analysts, incident responders, and SOC teams to provide context and support during security investigations.
- Build and maintain relationships with external threat intelligence communities and information-sharing organizations.
- Develop and implement threat hunting methodologies to proactively identify undetected malicious activity.
- Create and present comprehensive threat briefings to executive leadership and technical teams.
- Contribute to the development and improvement of the organization's threat intelligence platform and processes.
- Analyze malware samples and reverse-engineer malicious code to understand its functionality and propagation methods.
- Assess the impact of threats on the organization's assets and develop mitigation strategies.
- Contribute to security awareness training by providing insights into current and relevant threats.
- Maintain expertise in a wide range of cybersecurity technologies and methodologies.
- Mentor junior analysts and contribute to the growth of the threat intelligence team.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. A Master's degree or advanced certifications are a plus.
- A minimum of 5 years of hands-on experience in cybersecurity, with at least 3 years specifically focused on threat intelligence analysis.
- Demonstrated expertise in analyzing various types of cyber threats, including malware, phishing, APTs, and DDoS attacks.
- Proficiency with threat intelligence platforms, SIEM tools, and endpoint detection and response (EDR) solutions.
- Strong understanding of network protocols, operating systems, and common attack vectors.
- Experience with scripting languages (e.g., Python, PowerShell) for automation and data analysis.
- Excellent analytical, critical thinking, and problem-solving skills.
- Ability to communicate complex technical information clearly and concisely, both verbally and in writing.
- Familiarity with frameworks such as MITRE ATT&CK, Cyber Kill Chain, and diamond model is essential.
- Relevant certifications such as CISSP, GIAC GCTI, or CompTIA CySA+ are highly preferred.
- A proactive mindset with a passion for staying ahead of evolving cyber threats.
Remote Lead Threat Intelligence Analyst
Posted 1 day ago
Job Viewed
Job Description
As the Lead Threat Intelligence Analyst, you will be responsible for building and managing a comprehensive threat intelligence program. This includes gathering intelligence from various sources (open-source, technical feeds, human intelligence), analyzing adversary tactics, techniques, and procedures (TTPs), and creating detailed reports and briefings for executive leadership and technical teams. You will guide the development of predictive models, create attribution analysis, and provide strategic recommendations to enhance defensive capabilities. Collaboration with internal security teams, including SOC, incident response, and vulnerability management, will be crucial for integrating intelligence insights into daily operations. This role demands exceptional analytical rigor, strategic thinking, and leadership skills to guide a remote team.
Key responsibilities:
- Lead the development and execution of the organization's threat intelligence strategy.
- Monitor, collect, and analyze threat data from diverse global sources.
- Identify, track, and profile threat actors, their TTPs, and motivations.
- Develop actionable intelligence reports, briefings, and presentations for various audiences.
- Conduct advanced research on emerging threats, malware, and attack vectors.
- Provide strategic recommendations for improving security controls and defenses based on intelligence.
- Mentor and guide junior threat intelligence analysts.
- Collaborate with incident response and security operations teams to operationalize intelligence.
- Develop and maintain relationships with external intelligence sharing communities.
- Create and manage threat hunting hypotheses based on intelligence.
- Oversee the implementation and utilization of threat intelligence platforms (TIPs).
- Ensure the accuracy and relevance of intelligence products.