What Jobs are available for Threat Intelligence in Bahrain?
Showing 358 Threat Intelligence jobs in Bahrain
Senior Cybersecurity Analyst - Threat Intelligence & Incident Response
Posted 8 days ago
Job Viewed
Job Description
- Monitoring security alerts and logs from various sources (SIEM, IDS/IPS, EDR) to detect and analyze potential security incidents.
- Performing in-depth investigations of security breaches, malware infections, and other cyber threats.
- Developing and maintaining threat intelligence feeds and reports to inform proactive security measures.
- Leading and coordinating incident response activities, including containment, eradication, and recovery.
- Conducting vulnerability assessments and penetration testing to identify and remediate security weaknesses.
- Developing and implementing security policies, procedures, and best practices.
- Staying current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
- Contributing to the development and maintenance of security awareness training programs.
- Collaborating with IT and other departments to ensure a comprehensive security posture.
- Mentoring junior security analysts and providing technical guidance.
- Documenting security incidents, findings, and remediation actions thoroughly.
- Participating in red team and blue team exercises.
Is this job a match or a miss?
Senior Information Security Analyst - Threat Intelligence & Incident Response
Posted 25 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and logs from various security tools (SIEM, IDS/IPS, EDR, etc.) to detect and analyze potential security incidents.
- Conduct in-depth investigations into security breaches, malware infections, and other security-related events.
- Develop, refine, and execute incident response plans and procedures.
- Perform threat hunting activities to proactively identify and mitigate potential security risks.
- Analyze threat intelligence feeds and reports to stay informed about emerging threats and vulnerabilities relevant to the organization.
- Conduct vulnerability assessments and penetration testing (or coordinate with external teams).
- Develop and implement security controls and best practices to enhance the organization's security posture.
- Create and deliver security awareness training for employees.
- Document security incidents, findings, and remediation efforts in a clear and concise manner.
- Collaborate with IT and business units to implement security recommendations and ensure compliance with security policies.
- Participate in on-call rotation for security incident response.
- Stay up-to-date with the latest cybersecurity threats, trends, and technologies.
Qualifications:
- Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field.
- Minimum of 5 years of experience in information security, with a focus on threat intelligence and incident response.
- Hands-on experience with SIEM platforms (e.g., Splunk, QRadar), EDR solutions, and other security tools.
- Strong understanding of network protocols, operating systems (Windows, Linux), and common attack vectors.
- Proven experience in incident response methodologies and forensics.
- Familiarity with threat intelligence platforms and analysis techniques.
- Excellent analytical, problem-solving, and critical-thinking skills.
- Strong communication and reporting skills, with the ability to explain complex security issues to both technical and non-technical audiences.
- Relevant security certifications such as CISSP, GIAC (GSEC, GCIA, GCIH), or Security+ are highly desirable.
- Ability to work effectively under pressure and manage multiple priorities in a fast-paced environment.
- Must be able to work on-site in **Seef, Capital, BH**.
Is this job a match or a miss?
Senior Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
- Collect, process, and analyze threat intelligence data from a wide range of sources (OSINT, dark web, threat feeds, security tools).
- Develop and maintain a comprehensive understanding of current and emerging cyber threats, vulnerabilities, and attacker methodologies.
- Produce timely and actionable threat intelligence reports for various stakeholders, including executive leadership, SOC analysts, and incident responders.
- Identify and track threat actors, their motivations, capabilities, and targets relevant to the organization.
- Develop and refine threat hunting hypotheses based on intelligence analysis.
- Collaborate with security operations and incident response teams to provide context and support during cyber incidents.
- Contribute to the development and improvement of threat intelligence platforms and processes.
- Assess the impact of identified threats on the organization's assets and operations.
- Provide recommendations for enhancing security controls and defensive measures based on intelligence findings.
- Maintain relationships with external intelligence communities and information sharing groups.
- Mentor junior analysts and contribute to the team's overall expertise.
A Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field is required. A minimum of 6 years of experience in cybersecurity, with at least 3 years focused on threat intelligence analysis, is essential. Demonstrable expertise in analyzing malware, network traffic, and forensic data is highly desirable. Proficiency with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems is a must. Strong analytical, research, and critical thinking skills are paramount. Excellent written and verbal communication skills are necessary for producing clear and concise reports and briefings. Experience with scripting languages (e.g., Python) for automation of intelligence gathering and analysis is a significant advantage.
Is this job a match or a miss?
Senior Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Key responsibilities include developing and maintaining threat intelligence platforms, creating actionable intelligence reports for both technical and executive audiences, and building strong relationships with information sharing communities. You will proactively hunt for threats within our environment based on intelligence gathered. You will also be involved in developing indicators of compromise (IOCs) and correlating them with internal security event data. The ideal candidate will have a proven track record in threat hunting, incident response, or security operations. You should be proficient in scripting and automation for intelligence gathering and analysis. Strong analytical, critical thinking, and communication skills are essential, as you will need to articulate complex threat information clearly and concisely. This is a fully remote position, offering the flexibility to work from anywhere while contributing to a world-class cybersecurity operation. Our client is committed to fostering a culture of continuous learning and professional development in the ever-evolving field of cybersecurity. Your expertise will directly contribute to protecting our critical digital assets.
Responsibilities:
- Collect, analyze, and synthesize threat intelligence from diverse sources.
- Identify and track threat actors, their motivations, and their TTPs.
- Develop and disseminate actionable threat intelligence reports to relevant stakeholders.
- Contribute to the development and enhancement of threat intelligence platforms and tools.
- Conduct proactive threat hunting exercises based on gathered intelligence.
- Create and manage indicators of compromise (IOCs) for detection and prevention.
- Analyze malware samples and understand their behavior and impact.
- Collaborate with incident response teams to provide context during security investigations.
- Build and maintain relationships with external threat intelligence communities and partners.
- Stay current with emerging threats, vulnerabilities, and geopolitical cyber trends.
- Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent experience.
- 5+ years of experience in threat intelligence, cybersecurity operations, or incident response.
- Strong understanding of adversary TTPs and the cyber kill chain.
- Proficiency in utilizing various OSINT tools and techniques.
- Experience with SIEM and EDR platforms.
- Knowledge of malware analysis techniques and tools.
- Excellent analytical, critical thinking, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to present complex information clearly.
- Experience with scripting languages (e.g., Python) for automation is highly desirable.
- Relevant certifications such as GCTI, CIHE, or GCFA are a plus.
Is this job a match or a miss?
Cybersecurity Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Key responsibilities include:
- Monitoring open-source intelligence (OSINT), dark web, and other relevant feeds for emerging threats.
- Analyzing malware, phishing campaigns, and other attack vectors.
- Developing and maintaining threat profiles for known and emerging threat actors.
- Producing regular threat intelligence reports, alerts, and briefings.
- Collaborating with incident response and security operations teams to provide contextual information.
- Assisting in the development and refinement of security detection rules and signatures.
- Staying abreast of the latest cybersecurity trends, vulnerabilities, and exploits.
- Contributing to the development of threat hunting methodologies.
Is this job a match or a miss?
Senior Threat Intelligence Analyst
Posted 3 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze global threat intelligence sources (open-source, commercial, government).
- Identify emerging threats, campaigns, and adversary tactics, techniques, and procedures (TTPs).
- Conduct in-depth research on threat actors, malware, and attack vectors.
- Develop and maintain threat intelligence reporting and dissemination processes.
- Produce high-quality, actionable intelligence reports for technical and executive audiences.
- Support incident response activities by providing timely threat context and indicators of compromise (IoCs).
- Collaborate with security operations, incident response, and vulnerability management teams.
- Develop and tune threat detection rules and security monitoring capabilities based on intelligence.
- Contribute to threat modeling and risk assessments.
- Build and maintain relationships with external intelligence sharing communities.
- Stay abreast of the latest cybersecurity trends, tools, and methodologies.
- Mentor junior analysts and contribute to the team's knowledge base.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence analysis or similar role.
- Proven experience in analyzing various types of threat data, including network logs, malware, and open-source intelligence.
- Strong understanding of adversary TTPs, frameworks like MITRE ATT&CK, and cyber kill chain.
- Experience with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
- Excellent analytical, research, and investigative skills.
- Proficiency in scripting languages (e.g., Python) for data analysis and automation is a plus.
- Strong written and verbal communication skills, with the ability to present complex information clearly.
- Ability to work independently and effectively manage tasks in a remote environment.
- Relevant certifications (e.g., GIAC GCTI, CISSP) are highly desirable.
Is this job a match or a miss?
Senior Threat Intelligence Analyst
Posted 3 days ago
Job Viewed
Job Description
Responsibilities:
- Collect, analyze, and correlate threat data from diverse sources (e.g., OSINT, dark web, threat feeds).
- Develop and maintain threat intelligence reports, including adversary profiles, TTPs, and campaign analysis.
- Monitor the threat landscape for emerging threats and vulnerabilities relevant to our industry.
- Provide early warnings and actionable intelligence to inform security strategy and operations.
- Collaborate with incident response and SOC teams to support threat investigations.
- Develop and tune security detection rules based on threat intelligence.
- Conduct research on threat actors, malware, and attack vectors.
- Contribute to the development and improvement of threat intelligence tools and processes.
- Mentor junior analysts and share threat intelligence expertise within the team.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- 5+ years of experience in threat intelligence, cybersecurity analysis, or incident response.
- Demonstrated expertise in analyzing various types of threat data and intelligence sources.
- Proficiency with threat intelligence platforms (TIPs), SIEM systems, and security analysis tools.
- Strong understanding of cyber attack methodologies, malware analysis, and adversary TTPs.
- Excellent written and verbal communication skills, with the ability to present complex information clearly.
- Relevant cybersecurity certifications (e.g., CISSP, GIAC).
- Experience with scripting or programming languages (e.g., Python) for data analysis is a plus.
Is this job a match or a miss?
Be The First To Know
About the latest Threat intelligence Jobs in Bahrain !
Senior Threat Intelligence Analyst
Posted 3 days ago
Job Viewed
Job Description
Key Responsibilities:
- Collect, process, and analyze data from various sources, including open-source intelligence (OSINT), dark web monitoring, malware analysis, and honeypots.
- Identify and track advanced persistent threats (APTs) and other sophisticated cyber adversaries targeting organizations across various sectors.
- Develop comprehensive threat actor profiles, including their motives, capabilities, TTPs, and infrastructure.
- Produce high-quality intelligence reports, briefings, and alerts for technical and executive audiences, providing context, impact assessment, and actionable recommendations.
- Collaborate closely with incident response, security operations, and engineering teams to integrate threat intelligence into defensive strategies and tools.
- Develop and maintain threat hunting methodologies and playbooks to proactively search for indicators of compromise (IOCs) and TTPs.
- Stay current with the evolving threat landscape, emerging attack vectors, and new defensive technologies.
- Mentor junior analysts and contribute to the team's overall knowledge base and expertise.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Master's degree preferred.
- Minimum of 7 years of experience in cybersecurity, with a significant focus on threat intelligence, analysis, or security operations.
- Demonstrated expertise in analyzing malware, understanding network protocols, and interpreting forensic artifacts.
- Proficiency with threat intelligence platforms (TIPs), SIEM systems, and various security tools.
- Strong understanding of common attack vectors, exploit kits, and adversary TTPs (e.g., MITRE ATT&CK framework).
- Excellent analytical, critical thinking, and research skills.
- Exceptional written and verbal communication skills, with the ability to clearly articulate complex technical information.
- Ability to work independently and collaboratively in a fast-paced, remote environment.
Is this job a match or a miss?
Cybersecurity Threat Intelligence Analyst
Posted 3 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze global threat intelligence feeds, news, and security advisories to identify potential threats.
- Research and investigate advanced persistent threats (APTs), malware campaigns, and emerging attack techniques.
- Develop and maintain profiles of threat actors, their motivations, capabilities, and TTPs (Tactics, Techniques, and Procedures).
- Produce timely and actionable threat intelligence reports, briefings, and alerts for various stakeholders, including technical teams and executive leadership.
- Collaborate with incident response teams to provide context and support during security investigations.
- Develop and refine threat hunting methodologies to proactively identify compromises.
- Evaluate and recommend new threat intelligence tools and technologies.
- Build and maintain relationships with external threat intelligence communities and information sharing groups.
- Contribute to the development and improvement of the organization's overall cybersecurity strategy based on intelligence insights.
- Provide expert advice on mitigating cyber risks and enhancing defensive capabilities.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 5 years of experience in cybersecurity, with a significant focus on threat intelligence, incident response, or security operations.
- Demonstrated knowledge of cyber threat landscapes, geopolitical factors influencing cyber threats, and common attack methodologies.
- Experience with threat intelligence platforms (TIPs), SIEM tools, and data analysis techniques.
- Proficiency in interpreting technical data, such as network logs, malware analysis reports, and forensic findings.
- Strong analytical, critical thinking, and problem-solving skills.
- Excellent written and verbal communication skills, with the ability to present complex information clearly and concisely.
- Ability to work independently, manage multiple priorities, and meet deadlines in a fully remote environment.
- Relevant certifications such as GCTI, CISSP, CEH, or Security+ are highly desirable.
Is this job a match or a miss?
Cyber Threat Intelligence Analyst
Posted 3 days ago
Job Viewed
Job Description
Is this job a match or a miss?