58 Threat Intelligence jobs in the Philippines
Threat Intelligence Manager
Posted today
Job Viewed
Job Description
I. PURPOSE
Execute activities that will improve existing operations and operationalize new service portfolio to achieve service excellence, operational efficiency, business profitability, and retention of customers.
II. DUTIES AND RESPONSIBILITIES
Accomplish all assigned tasks by the management in a timely and effective manner as deemed necessary for the betterment of the organization.
Manage teams and ensure accordance with the support and operations' policies, protocols, and procedures.
Oversee the 24x7x365 management of teams and overall performance and reliability of the shift.
Ensure effective and efficient processes are followed, and that proper escalation protocols are in place and complied with by the teams.
Prepare shift hand over report. Hand over open and ongoing events, incidents, and escalations to the next shift.
Collaborate and contribute with other managers in improving workflows, documentations, standards, and processes.
Accountable for the growth of team members and ensuring succession plan is in place.
Evaluate the skill sets of each group member and give recommendations to the MSS Manager for growth.
Responsible/Accountable in providing input to training and certifications plan for his direct reports and ensure that the entire group is covered according to business operations need.
Conduct performance review of team members.
Contribute to the knowledge and information relevant to Operations.
Participate in activities promoting a harmonious working environment such as demonstrating trust and respect and practicing open communication.
Comply with company policies, guidelines, standards, and procedures.
Professionally represent Trends management; enriching client relationships and providing expertise, composure, and competence.
Perform all other duties and tasks as assigned by the MSS Manager.
Threat Intelligence
- Monitor the displayed information on the Threat Intelligence Platform (TIP) related to emerging threats, vulnerabilities, campaigns, etc.
- Conduct research using the Threat Intelligence Platform (TIP) or any other relevant source of information such as open-source, proprietary or commercial information to gather cyber and IT information about threats, vulnerabilities, and/or any other party that needs to be monitored for awareness.
- Monitor, utilize the collected data, and report to the client if affected by pre-NVD and zero-day vulnerabilities.
- Utilize Threat Intelligence Platform's threat intelligence card and advanced queries for deeper and more contextual investigation.
- Investigate information on the intention to target clients, their industry like major activist campaigns, and indications of activism and all relevant intelligence against the clients.
- Perform industry peer comparison and determine the trending attack methods.
- Prepare and submit the following reports based on frequency:
- Operational Intelligence Report (Weekly Digest)
- Tactical Intelligence Report (Daily Digest)
- Incident-related Reports (Adhoc)
- Other operational report as directed by the business
- Lead the team in establishing cyber protection programs and activities.
- Perform as lead researcher, giving guidance to team on where, what, and how to dig information.
- Review materials prepared and written by the team.
- Create analyst notes (or validated research documents) and collaborate with other members of the team for verification of reports.
- Detect, report, and request for takedowns of servers launching phishing attacks, fake applications that impersonate legitimate ones from app stores, malicious websites, or fraudulent social media accounts.
- Report any brand attack and data leakage detection from the solution with corresponding mitigating actions.
Threat Hunting
- Configure tools and detect patterns/outliers within client environments matching tactics, techniques, or procedures (TTPs) of known threat actors, malware or other unusual or suspicious behaviors.
- Conduct cyber hunts in support of identifying emerging threats on behalf of multiple clients, often operating as a lead investigator.
- Provide expert analytic investigative support for large-scale and complex security incidents across multiple clients and support the TOC team through the investigation, recommendations, response, and post-mortem efforts.
- Monitor multiple client environments and investigate & report on emerging threats.
- Work with internal teams on orchestration & tool-based enablement and optimization of team processes supporting overall service delivery.
- Conduct dynamic and static malware analysis on samples obtained during incident handling or hunt operations to identify IOCs.
- Contribute to documenting simple and reusable hunt tactics and techniques for the extended and shifting team delivering threat services.
- Engage with client POCs as necessary to help them truly mature and optimize their security architecture, primarily from a risk management and incident response perspective.
Availability Management
- Manage monthly shift schedules, create appropriate shift design, manage conflicts within the shift, design operational process guidelines, and ensure cascade and understanding of the shift being managed as compliance to agreed levels of availability of people and processes needed for Operations delivery.
- Operationalization of management defined metrics and reporting compliance.
- Ensures that tools being used are appropriate for the agreed service level targets for availability such as tools for role-based access design, availability reporting, and design testing.
Capacity Management
- Determine and report the capacity and performance of people, processes, and organizational controls, and ensure resolution of issues through tactical adjustment of operational processes, people, and platform.
- Work with other managers to gather data and develop strategies as input to the business plan and execute these strategies to deliver the service and plans for short, medium, and long-term business requirements.
IT Service Continuity Management
- Perform the role assigned in the Business Continuity Plan (BCP).
- Create and perform adjustments in the operational processes in compliance with the Business Continuity Plan (BCP) objectives to ensure service delivery objectives are met in case of a disaster.
- Provide input to the Operations' Business Impact analysis to reduce risks to an acceptable level and plan for the team's recovery.
Risk Management
- Execute risk treatment plans for people and processes needed for Operations.
Service Level Management
- Ensure compliance of Service Level Agreements with clients.
- Manage the performance of team members in Internal Support
- Monitor and report on Operational Service Levels.
Change Advisory Board
- Approve Method of Procedures to be presented during Managed ICT Services Change Advisory Board meetings.
- Participate in client Change Advisory Board meetings.
- Advise client during Operational discussions on the possible impact, risks, and effects of proposed client changes.
- Create advisories on the possible impact, risks, and effects of proposed client changes.
- Provides Method of Procedure/s and other documentation to clients whenever necessary.
Configuration Management
- Responsible for accepting Configuration Items (CI) and other relevant information of Transitions.
- Sign off CI of client assets and its components as part of Operations, and handover CI and other relevant information to Transitions for Offboarding.
Client Support
- Ensure that the team members are:
- Performing triage on received events and incidents.
- Handling cases assigned.
- Undertaking immediate effort/s to restore a failed service of a Managed Service client as quickly as possible.
- Performing brand monitoring and takedown requests.
- Handling escalation and follow-ups until resolution.
- Review Incident and Root-Cause-Analysis (RCA) Reports.
Client Incident Management
- Review operational playbooks to detect, analyze, eradicate, remediate, and recover from client cybersecurity incidents.
- Guarantee that quality of service incidents is reviewed and adjusted according to client needs, agreed standards and frameworks.
- Lead resolution of P1 and P2 incidents.
- Review RCA Reports and ensure Corrective Actions/Preventive Actions (CA/PA) are executed.
Client Access Management
- Performs authorization of users' right to access client assets, while preventing access to non-authorized users.
- Essentially executes Terms and Conditions of the client.
Client IT Asset Management
- Ensure that clients' managed assets are accounted for, maintained, upgraded (if within scope), and that lifecycle is monitored.
- Provides reports and recommendations to the Client, Service Delivery Manager/s, and other relevant stakeholders.
Client Problem Management
- Leads P1/P2 RCA and ensure CA/PA is implemented on time.
- Ensure shift compliance with contractual Problem Management deliverables.
- Acts as the Problem Manager for P1/P2 incidents:
- Manage the lifecycle of all identified problems.
- Prevent recurring incidents from happening and minimize the impact of recurring incidents that cannot be prevented.
- Maintain information or Knowledgebase about Known Errors and Workarounds.
- Identify Problem records.
- Attend Problem Management meetings with the MSS Manager.
Process Management
- Create, share, use, and manage the documented processes of Service Operations, and ensure that these processes are being followed.
Knowledge Management
- Responsible in updating the knowledge and information pertaining to existing Clients and clients' Managed ICT assets.
Continual Service Improvement Management
- Execute improvement plans of the people and processes of Operations at a tactical level.
- Review and approve tactical and operational changes and ensure its deployment.
- Ensure the quality of data and content of tickets are reviewed.
III. QUALIFICATIONS
A. Minimum Education
- Must be a graduate of any IT related bachelor's degree such as:
- Computer Studies
- Computer Engineering
- Information Technology
- Electronics Engineering
B. Minimum Experience/Training
- Have at least 5 years of working experience in a 24x7x365 Security Operations Center.
- Trainings and/or certifications on at least 2 of the following domains are required:
- IT Service Management
- IT Infrastructure (Network, Servers, Cloud, etc.)
- Cybersecurity and/or Information Security
- Threat Intelligence Certifications i.e. CTIA, GCTI, CCTIA
- eCTHPv2 or other related certification
- OSINT/Threat Intelligence Trainings
C. Competency
(F) - Familiar / 0-12 months
(N) - Novice / 1-2 years
(I) - Intermediate / 3-4 years
(A) - Advanced / > 5 years
KNOWLEDGE
(A) Knowledge of cybersecurity and privacy principles.
(A) Knowledge of computer networking concepts and protocols, and network security methodologies.
(A) Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
(A) Knowledge of cyber threats and vulnerabilities.
(A) Knowledge of specific operational impacts of cybersecurity lapses.
(A) Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
(A) Knowledge of system administration, network, and operating system hardening techniques.
(A) Knowledge of MITRE ATT&CK Framework and NIST SP800-61
TECHNICAL SKILLS
(A) ITIL
(A) Networking Fundamentals
(A) Operating System Fundamentals
(A) Application/Web Programming
(A) Enterprise Application Architecture
(A) Cybersecurity Fundamentals
(A) Secure Network Architecture
(A) Application Security & Secure Coding Practices
(I) Identity & Access Management Principles
(A) Cryptography & Encryption Technologies
(I) Perimeter Defense Technologies
(I) End-Point Protection Technologies
(A) Vulnerability Scanning & Ethical Hacking
(A) Advanced Persistent Threats & pattern modeling
(A) Forensic Investigation
(N) Dark web Surfing & Intel Gathering
COMMUNICATION SKILLS
(A) Speaks clearly and can be easily understood.
(A) Expresses & speaks ideas in a logical and organized sequence.
(A) Writes clearly, concisely, and effectively.
(A) Expresses ideas in a logical and organized sequence in written form.
IV. WORKING CONDITIONS
Reporting to the company's main office in Makati City.
Shifting schedule.
Collaborate physically and/or virtually with internal and external stakeholders.
May travel for company-sponsored conferences and related marketing events.
Attend training and acquire certifications that are applicable to the role.
Threat Intelligence Engineer
Posted today
Job Viewed
Job Description
Position:
Threat Intelligence Engineer
Location:
REMOTE in Philippines
Interview Process:
2 round interview process
Rate: $8-10hr
Must-haves:
- 2+ years of experience within an analytical role- background in cybersecurity preferred
- Experience with threat data collection and analysis, threat intelligence mapping and reporting
- Familiarity with common cybersecurity tools and platforms such as siems, threat intelligence platforms, and network monitoring
Day-to-day:
As a Threat Intelligence Engineer, you will support our cybersecurity team by analyzing, collecting, and sharing actionable threat intelligence to protect our organization's digital assets. You will collaborate across teams to identify emerging threats and assist in investigations and mitigation efforts. This role offers opportunities to work with cutting-edge cybersecurity technologies in a dynamic environment. This person will be responsible for Threat Data Collection, mapping and monitoring, research and investigation. This role requires the ability to conduct cross-team collaboration.
Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Role: Threat Intelligence Analyst
Location : Mall of Asia, Pasay City
Work Type: Hybrid (1-2x a month)
Work Shift: Night Shift
Job Description:
Requirements Threat Intelligence Analyst
Must have - College Graduate
- At least 1 year experience in Technical Writing and Research (Technical Writers)
- General knowledge or familiarity (even if not direct experience) with Threat Analysis and Threat Landscape, MITRE ATT&CK framework, OSINT research (Open-Source Intelligence) is a must
Nice to have - Preferred, not a priority - familiar with using JIRA
- Scripting knowledge
Note :
Interested candidates feel free to share your updated resume to
Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Job Description
Project Role : Threat Intelligence Analyst
Location : Pasay city
Requirements :
Must have - College Graduate
At least 1 year experience in Technical Writing and Research (Technical Writers)
General knowledge or familiarity (even if not direct experience) with Threat Analysis and Threat Landscape, MITRE ATT&CK framework, OSINT research (Open-Source Intelligence) is a must
Nice to have - Preferred, not a priority - familiar with using JIRA
- Scripting knowledge
Note: Interested candidate can directly reach out
Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Job Title: Threat Intelligence Analyst
Position Summary
As a Threat Intelligence Analyst, you will research and analyze emerging cyber threats, produce concise analyst notes, and communicate findings to both technical and non-technical audiences. You will use open-source intelligence (OSINT) and internal tools such as the Recorded Future Intelligence Cloud to inform clients and internal stakeholders of the latest cyber threat activities, ensuring timely and actionable insights.
Key Responsibilities
Research & Analysis
Conduct in-depth research on cyber threat events, using OSINT sources and the Recorded Future Intelligence Cloud.
- Identify and assess trending cyberattacks, including ransomware, phishing, software vulnerability exploitation, and other emerging threats.
Map identified threats to frameworks such as MITRE ATT&CK and the diamond model of intrusion analysis.
Reporting & Writing
Produce analyst notes referencing both open-source and internal intelligence, adhering to a clear, technical writing style.
- Ensure reports are concise, informative, and appropriately tailored for defenders, technical teams, and non-technical stakeholders.
Publish analyst notes to the Recorded Future Intelligence Cloud, including all relevant entities (e.g., threat actors, malware, TTPs, MITRE IDs).
Collaboration & Communication
Work closely with global Threat Intelligence Analyst teams (Philippines, Australia, UK, US) to refine and validate findings.
- Engage in team meetings to share updates, discuss guidance changes, and participate in ongoing training.
Provide ad-hoc support or additional coverage as needed by the business.
Process & Best Practices
Accurately document and interpret raw data, mapping it to recognized threat intelligence frameworks.
- Maintain up-to-date knowledge of the cyber threat landscape and emerging trends.
- Contribute to process improvements and share learnings/best practices within the team.
Must Have Qualifications- Experience
- At least one (1) year of professional experience in cybersecurity, cyber threat intelligence, or a closely related field, OR
At least two (2) years of professional experience in technical writing, due diligence, risk assessments, physical threat intelligence, fraud intelligence, or any role requiring substantial report writing.
Technical & Analytical Skills
Solid understanding of basic cyber threats (e.g., malware, phishing, trojans, botnets).
- Familiarity with OSINT research techniques and sources.
Ability to accurately interpret raw data and translate it into clear, coherent reports.
Communication & Writing Skills
Excellent English-language grammar and reading comprehension.
- Strong verbal communication skills in English.
- Demonstrable ability to produce structured, concise, and accurate written analysis tailored to different audiences.
- Preferred: Working proficiency (reading and writing) in Spanish or Portuguese
Soft Skills & Work Ethic
Strong attention to detail and accuracy.
- Curiosity-driven approach to research and problem-solving.
- Ability to thrive in a collaborative, fast-paced environment.
- Flexibility to work different shifts, including possible night shifts, as required by the business.
- Strong organizational skills to handle multiple projects and deadlines.
Desirable (Nice to Have)
Technical Proficiency
Prior hands-on experience with threat intelligence platforms or feeds.
Familiarity with applying frameworks such as MITRE ATT&CK, the diamond model, CVE standards, and/or the cyber kill chain.
Industry Knowledge
Up-to-date awareness of current trends and ongoing developments in cybersecurity and the broader threat landscape.
- Ability to propose actionable mitigations or defensive strategies based on threat intelligence findings.
- Special interest and demonstrated understanding of cybersecurity issues throughout Latin America
In-depth knowledge of popular news sources, including technical publications, throughout Latin America.
Certifications
Relevant cybersecurity or threat intelligence certifications (e.g., Security+, CySA+, GCTI, GCIA, CISSP, etc.).
Cyber Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Join the Pioneer Crypto Brand in the Philippines
Coins is the most established crypto brand in The Philippines and has gained the trust of more than 18 million users. Through the easy-to-use mobile app, users can buy and sell a variety of different cryptocurrencies and access a wide range of financial services.
Coins is fully regulated by the Bangko Sentral ng Pilipinas (BSP) and is the first ever crypto-based company in Asia to hold both Virtual Currency and Electronic Money Issuer licenses from a central bank.
We are seeking a skilled and motivated Cyber Threat Intelligence Analyst to strengthen our Security Operations team.
In this role, you will play a critical part in identifying, analyzing, and mitigating emerging cyber threats targeting the crypto and blockchain ecosystem.
The ideal candidate will combine technical expertise with strong analytical skills to transform intelligence data into actionable insights, directly enhancing the security posture of our exchange platform.
Responsibilities:- Continuously monitor and assess emerging cyber threats, vulnerabilities, and exploitation techniques that may impact company systems and services.
- Conduct research on adversary tactics, techniques, and procedures (TTPs) to improve threat detection and strengthen defense strategies.
- Develop automation and data enrichment scripts (Python/Golang preferred) to process threat intelligence feeds and indicators.
- Collaborate with security engineers, incident responders, and other stakeholders to integrate intelligence into detection and response workflows.
- Build and maintain intelligence use cases, reports, and dashboards; provide clear and concise threat briefings to technical and executive audiences.
- Perform investigations into potential threats leveraging open-source, proprietary, and deep/dark web intelligence sources.
- Analyze and track crypto-related threats, including phishing campaigns targeting exchange users, wallet-based attacks, and fraud-related activities.
- At least 3 years of hands-on experience in cyber threat intelligence, security analysis, or related fields.
- Strong understanding of incident response processes, APT activity, insider threats, and related attack scenarios.
- Proven experience with threat intelligence platforms and producing actionable threat reports.
- Solid knowledge of networking fundamentals (TCP/IP, OSI layers), malware behavior, and the global threat landscape (e.g., nation-state actors, cybercrime groups).
- Familiarity with security technologies such as IDS/IPS, firewalls, SIEM, EDR, WAF, etc.
- Understanding of blockchain technology, crypto exchanges, and Web3 ecosystems.
- Prior threat intelligence experience specific to blockchain/Web3, including monitoring crypto-focused threat actors and attack vectors.
Join the Coins Team Now
Meaningful Collaborations - The successful candidate will work cross-functionally with other relevant teams to carry out implementations that will improve and create an impact on customer experience.
Scalable Growth - Be part of a fast-growing organization with the vision to expand its territories outside APAC which will provide opportunities for career advancement.
A Space For Bright Ideas - Let your bright ideas be converted into meaningful changes Coins culture welcomes new ideas backed up by data to create an impact.
Cyber Threat Intelligence Engineer
Posted today
Job Viewed
Job Description
The role of the candidate is to be a part of GIS Cybersecurity team to function as a Senior Manager in the Cyber Threat Intelligence Team.
The role requires to proactively investigate security events to identify artifacts of a cyber-attack detect advanced threats that evade traditional security solutions, threat actor-based investigations, creating new detection methodology, support incident investigations and monitoring functions. Threat hunting includes using both manual and machine-assisted capabilities, that aims to find the Tactics, Techniques and Procedures (TTPs) of advanced adversaries.
The candidate must have a curious investigative mindset, experienced in information security, and the ability to communicate complex ideas to varied stakeholders.
Roles and Responsibilities:
- Develop, document, and maintain cyber threat hunting framework
- Hunt and identify for threat actor groups, techniques, tools and procedures (TTPs)
- Perform threat hunting through analysis of anomalous log data to detect and mitigate cyber threat activities
- Actively develop threat hunting hypothesis, translating hunt activities into an iterative process, and automating the process of hunting for cyber threats.
- Review alerts generated by security monitoring tools and provide recommendation to enhance alerts for more efficient monitoring.
- Provide forensic analysis of network packet captures, DNS, proxies, malware, host-based security, and application logs, as well as logs from various data sources
- Provide expert investigative support during large scale and complex security incidents
- Analysis of security incidents to enhance security monitoring and alert catalogue
- Investigate and validate suspicious events by using open-source and proprietary intelligence sources.
- Document and communicate findings to an array of audiences which includes both technical and executive teams.
- Continuously improving processes and use cases on security monitoring tools
- Keep up to date with information security news, adversary techniques and threat landscape
- Support day-to-day operations, ensuring efficient delivery of Cyber Threat Intel services.
- Candidate may be asked to be involved in additional supporting role for strategical work and security related projects.
Minimum Job Requirements:
- Must have a minimum 6-8 years of experience in a technical security role in one of the following areas: Cyber Threat Intelligence, Cyber Threat Hunting, Cyber Incident Response, Malware Analysis, Purple Teaming
- Acquired relevant certifications: GCTI, CCIP, CIA
- Experience with researching and incorporating Cyber Threat Intelligence findings into threat hunting workflow
- Knowledge and experience working with MITRE ATTACK framework, Cyber Kill Chain Model or Diamond Model
- Proficiency in using threat intelligence platforms and OSINT tools.
- Knowledge of malware and threat actor's behavior, and how common protocol and applications work at network level.
- Experience with incident response process, including detecting advanced adversaries, log analysis and malware triage
- Good understanding in network protocols and system vulnerabilities.
- Knowledge and experience in developing detection signatures (YARA, SNORT)
- Highly capable in producing Threat Advisories and Intelligence Reports for Senior Management in a timely manner.
JOIN US NOW Be part of the Industry's certified GREAT PLACE TO WORK for and enjoy these comprehensive benefit package upon hire and upon regularization;
HMO with free 4 dependents (upon hire for Principal and upon regularization for the eligible dependents)
15 days VL and 15 days SL (Pro-rated for mid-year hire)
Guaranteed 14th-month pay
Annual Targeted Incentive (Performance Bonus)
Group Life Insurance
Protection benefits and a lot more w/c will be discussed during the job offer stage
#EmpowerYourCareer #EqualOpportunities
Be The First To Know
About the latest Threat intelligence Jobs in Philippines !
Cyber Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Why Join Us?
Check Point Infinity External Risk Management, otherwise known as Cyberint, continuously reduces external cyber risk by managing and mitigating an array of external cyber security threats with one unified solution.
We are looking for a
Cyber Threat Intelligence Analyst
to be an integral part of our Intelligence teams, combining both cutting-edge technology and advanced threat intelligence analysis methodologies to deliver high-impact briefings to our customers
Key Responsibilities
- Learning the customer needs and PIRs, configuring their tailored environments in the ERM intelligence platform and supporting the customers with tuning/training throughout engagement
- Monitoring and analyzing threats targeting customers, or issues in their digital exposure, in order to produce actionable intelligence alerts and reports.
- Investigating intelligence sources, threat actors, attack tools and techniques
- Identifying and developing ERM data sources to collect the most relevant intelligence (darknet, forums, social media, marketplaces, etc.) as well as creating and maintaining avatars on these.
- Developing the proprietary intelligence platform by surfacing new modules, capabilities and features
- Joining meetings with prospects and clients to present deliverables.
- Drive cooperation & feedback loops with other ERM teams
Qualifications
- 3-5 years experience with intelligence analysis processes (army included), including Open-Source Intelligence (OSINT) and Web Intelligence (WEBINT) gathering, link analysis, and threat actor profiling
- Inherent passion for Infosec and service excellence, understanding of cybersecurity
- Investigative and analytical problem-solving skills
- Knowledge of analytical tools, including excel
- Fluent English
- Infosec certifications an advantage
- Customer facing background an advantage
Cyber Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Join the Pioneer Crypto Brand in the Philippines
Coins is the most established crypto brand in The Philippines and has gained the trust of more than 18 million users. Through the easy-to-use mobile app, users can buy and sell a variety of different cryptocurrencies and access a wide range of financial services.
Coins is fully regulated by the Bangko Sentral ng Pilipinas (BSP) and is the first ever crypto-based company in Asia to hold both Virtual Currency and Electronic Money Issuer licenses from a central bank.
We are seeking a skilled and motivated
Cyber
Threat Intelligence Analyst to strengthen our Security Operations team.
In this role, you will play a critical part in identifying, analyzing, and mitigating emerging cyber threats targeting the crypto and blockchain ecosystem.
The ideal candidate will combine technical expertise with strong analytical skills to transform intelligence data into actionable insights, directly enhancing the security posture of our exchange platform.
Responsibilities:
- Continuously monitor and assess emerging cyber threats, vulnerabilities, and exploitation techniques that may impact company systems and services
- Conduct research on adversary tactics, techniques, and procedures (TTPs) to improve threat detection and strengthen defense strategies
- Develop automation and data enrichment scripts (Python/Golang preferred) to process threat intelligence feeds and indicators
- Collaborate with security engineers, incident responders, and other stakeholders to integrate intelligence into detection and response workflows
- Build and maintain intelligence use cases, reports, and dashboards; provide clear and concise threat briefings to technical and executive audiences
- Perform investigations into potential threats leveraging open-source, proprietary, and deep/dark web intelligence sources
- Analyze and track crypto-related threats, including phishing campaigns targeting exchange users, wallet-based attacks, and fraud-related activities
Qualifications:
- At least 3 years of hands-on experience in cyber threat intelligence, security analysis, or related fields
- Strong understanding of incident response processes, APT activity, insider threats, and related attack scenarios
- Proven experience with threat intelligence platforms and producing actionable threat reports
- Solid knowledge of networking fundamentals (TCP/IP, OSI layers), malware behavior, and the global threat landscape (e.g., nation-state actors, cybercrime groups)
- Familiarity with security technologies such as IDS/IPS, firewalls, SIEM, EDR, WAF, etc
Plus Points:
- Understanding of blockchain technology, crypto exchanges, and Web3 ecosystems
- Prior threat intelligence experience specific to blockchain/Web3, including monitoring crypto-focused threat actors and attack vectors
Join the Coins Team Now
Meaningful Collaborations - The successful candidate will work cross-functionally with other relevant teams to carry out implementations that will improve and create an impact on customer experience.
Scalable Growth - Be part of a fast-growing organization with the vision to expand its territories outside APAC which will provide opportunities for career advancement.
A Space For Bright Ideas - Let your bright ideas be converted into meaningful changes Coins culture welcomes new ideas backed up by data to create an impact.
Cyber Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Lexmark is now a proud part of Xerox, bringing together two trusted names and decades of expertise into a bold and shared vision.
When you join us, you step into a technology ecosystem where your ideas, skills, and ambition can shape what comes next. Whether you're just starting out or leading at the highest levels, this is a place to grow, stretch, and make real impact—across industries, countries, and careers.
From engineering and product to digital services and customer experience, you'll help connect data, devices, and people in smarter, faster ways. This is meaningful, connected work—on a global stage, with the backing of a company built for the future, and a robust benefits package designed to support your growth, well-being, and life beyond work.
JOB SUMMARY:
We are seeking a highly analytical and proactive Cyber Threat Intelligence Analyst (CTI Analyst) to join our cybersecurity team. This role is critical in helping the organization stay ahead of cyber threats by gathering, analyzing, and translating threat data into actionable intelligence. The ideal candidate will have a deep understanding of adversary tactics, techniques, and procedures (TTPs), and will be skilled at turning complex data into clear insights that inform security strategy and operations.
KEY ROLES AND RESPONSIBILITIES:
- Monitor and Analyze Threat Landscape: Track emerging threats, malware campaigns, and threat actor activity across various sectors and geographies.
- Gather Intelligence: Collect data from open-source intelligence (OSINT), dark web forums, internal telemetry, and commercial threat feeds.
- Threat Attribution: Analyze and correlate data to identify threat actors and understand their motivations, infrastructure, and attack patterns.
- Produce Intelligence Reports: Create strategic, tactical, operational, and technical threat intelligence reports tailored to different stakeholders.
- Collaborate Across Teams: Work closely with SOC, incident response, and vulnerability management teams to integrate threat intelligence into detection and response workflows.
- Identify IOCs and Vulnerabilities: Document indicators of compromise (IOCs) and emerging vulnerabilities to support proactive defense.
- Maintain Intelligence Tools: Configure and manage threat intelligence platforms and automation tools to streamline analysis and reporting.
- Track APTs and Cybercriminal Groups: Monitor the activities of Advanced Persistent Threats (APTs) and cybercriminal organizations relevant to the business.
COMPETENCIES, SKILLS, KNOWLEDGE AND ABILITIES:
- Strong understanding of cyber threat intelligence concepts and frameworks (e.g., MITRE ATT&CK, Diamond Model).
- Experience with threat intelligence platforms (TIPs), SIEMs, and malware analysis tools.
- Excellent written and verbal communication skills, especially in translating technical data for non-technical audiences.
- Ability to work independently and collaboratively in a fast-paced environment.
- Must be highly motivated with the ability to self-start, prioritize, multi-task and work in a team setting with global peers.
- Possess a good technical understanding, takes initiative to remain up to date with cyber security skills, and fosters an attitude of continual learning/adapting.
- Knowledge of threat intelligence platform capabilities for operationalizing and delivering actionable intelligence to key groups and stakeholders to manage remediation.
- Strong communication skills, including clear verbal and written communication, collaboration, technical presentations, adaptability, and interpersonal skills.
EXPERIENCE, EDUCATION AND CERTIFICATION BASIC REQUIREMENTS:
- Bachelor's Degree (Cybersecurity, Computer Science, Information Systems, or related field)
- Professional Certifications: Preferred
- Certified Threat Intelligence Analyst (C|TIA) – EC-Council
- GIAC Cyber Threat Intelligence (GCTI) – GIAC
- Certified Information Security Manager (CISM) – ISACA
- Certified Ethical Hacker (CEH) – EC-Council
Job Types: Full-time, Permanent
Benefits:
- Company events
- Employee discount
- Flexible schedule
- Flextime
- Free parking
- Health insurance
- Life insurance
- On-site parking
- Opportunities for promotion
- Work from home
Work Location: In person