Cyber Threat Analyst

3 weeks ago


Pasay, National Capital Region, Philippines HR TechX Corp. Full time

Join to apply for the Cyber Threat Analyst role at HR TechX Corp.

Get AI-powered advice on this job and more exclusive features.

Responsibilities
  • Threat Lead Identification: Research new adversary tactics, techniques, and procedures (TTPs) using open sources (public information such as security vendor reporting, social media, code repositories); closed sources (dark web and underground forums); and proprietary sources.
  • Subject Matter: Threat leads should focus on team priority intelligence requirements (PIRs). Examples of such subject matter include malware developments, offensive security tools, vulnerability exploits, cloud security, and mobile security.
  • Key Detail Identification: During research, identify and take note of infection chains, host and network IoCs, malware samples, threat actors, and MITRE ATT&CK tactics and techniques
  • Author Insikt Notes: Write TTP Instances detailing identified threat leads. TTP Instances include a combination of information from open-source reporting and your own analysis (i.e. code review, static malware analysis). TTP Instances are written and formatted to help our customers understand infection chains while also helping them prepare and validate their defenses.
  • Cadence: Write at least 2 TTP Instance notes daily
  • Quality: Authored TTP Instances should include minimal grammatical or syntax errors. Plagiarism is not acceptable.
  • Malware Analysis: Using sandbox environments and static analysis tools, analyze malware samples associated with threat leads.
  • Use Cases: Malware analysis is used to provide additional insight into an event, validate open-source reporting, uncover additional IoCs, and assist peers and customers in detection engineering
  • Detection Engineering: Create malware or vulnerability detections (e.g. YARA, Sigma, Snort, Nuclei) that can be used for threat hunting, detection, and classification.
  • Cadence: Create at least 1 malware or vulnerability detection per month
  • Delivery: In most cases, these detections will be delivered alongside a TTP Instance.
  • Information Security: Adhere to and implement Infinit-O's quality and information security policies and carry out its processes and procedures accordingly.
  • Protect client-supplied and generated-for-client information from unauthorized access, disclosure, modification, destruction, or interference (see also Table of Offenses)
  • Carry out tasks as assigned and aligned with particular processes or activities related to information security.
  • Report any potential or committed non-conformity, observation and/or security vent or risks to immediate superior.
Specific Duties and Responsibilities
  • Threat Lead Identification: Research new adversary tactics, techniques, and procedures (TTPs) using open sources (public information such as security vendor reporting, social media, code repositories); closed sources (dark web and underground forums); and proprietary sources.
  • Subject Matter: Threat leads should focus on team priority intelligence requirements (PIRs). Examples of such subject matter include malware developments, offensive security tools, vulnerability exploits, cloud security, and mobile security.
  • Key Detail Identification: During research, identify and take note of infection chains, host and network IoCs, malware samples, threat actors, and MITRE ATT&CK tactics and techniques
  • Author Insikt Notes: Write TTP Instances detailing identified threat leads. TTP Instances include a combination of information from open-source reporting and your own analysis (i.e. code review, static malware analysis). TTP Instances are written and formatted to help our customers understand infection chains while also helping them prepare and validate their defenses.
  • Cadence: Write at least 2 TTP Instance notes daily
  • Quality: Authored TTP Instances should include minimal grammatical or syntax errors. Plagiarism is not acceptable.
  • Malware Analysis: Using sandbox environments and static analysis tools, analyze malware samples associated with threat leads.
  • Use Cases: Malware analysis is used to provide additional insight into an event, validate open-source reporting, uncover additional IoCs, and assist peers and customers in detection engineering
  • Detection Engineering: Create malware or vulnerability detections (e.g. YARA, Sigma, Snort, Nuclei) that can be used for threat hunting, detection, and classification.
  • Cadence: Create at least 1 malware or vulnerability detection per month
  • Delivery: In most cases, these detections will be delivered alongside a TTP Instance.
  • Information Security: Adhere to and implement Infinit-O's quality and information security policies and carry out its processes and procedures accordingly.
  • Protect client-supplied and generated-for-client information from unauthorized access, disclosure, modification, destruction, or interference (see also Table of Offenses)
  • Carry out tasks as assigned and aligned with particular processes or activities related to information security.
  • Report any potential or committed non-conformity, observation and/or security vent or risks to immediate superior.
QualificationRequired Skills
  • Strong written communication in English
  • Demonstrable experience writing reports on technical subject matter (e.g. malware, vulnerability exploits, offensive security tools) in a clear, concise, and logical format
  • Disciplined time management
  • Self-starting, self-motivated, and thrive in a collaborative environment
  • Ability to receive and apply constructive feedback from peers and leadership
Minimum Qualifications
  • B.S. equivalent in computer science, information systems, or cyber intelligence
  • One (1) year professional experience
  • Technical proficiency in Cyber Threat Intelligence and Threat Intelligence Platforms
  • Experience working with open-source intelligence (OSINT) and/or large data sets
  • Experience working with sandboxes, virtual machines, or other malware analysis tools
  • Familiarity with the MITRE ATT&CK Framework, including the ability map reported activity to ATT&CK tactics and techniques
  • Familiarity with interpreting and mapping cyberattacks to the Diamond Model of Intrusion Analysis
  • Adeptness in cybersecurity and data protection
Preferred Qualifications
  • Proficiency in scripting or programming languages (PHP, C, C#, C++, Python, PowerShell, Go, JavaScript, Rust)
  • Experience creating malware detections (e.g. YARA, Sigma, Snort)
  • Experience creating vulnerability detections (e.g. Nuclei)
Seniority level
  • Not Applicable
Employment type
  • Full-time
Job function
  • Information Technology
Industries
  • Technology, Information and Internet
#J-18808-Ljbffr

  • Pasay, National Capital Region, Philippines beBeeThreat Full time $90,000 - $125,000

    Intelligence StrategistThe goal of this role is to drive Canonical's threat intelligence strategy, focusing on understanding cyber threats targeting Canonical. You will collaborate with internal stakeholders and the wider cybersecurity community to establish Canonical as a leading authority in open source threat intelligence.This position will oversee...


  • Pasay, National Capital Region, Philippines ACCPRO INTERNATIONAL Full time ₱1,200,000 - ₱2,400,000 per year

    Vulnerability Analyst (Hybrid Setup – Pasay, MOA)Location: MOA, Pasay (Hybrid – 1–2x a month onsite)Schedule: Mid Shift (Login between 4–5 PM)Work Setup: Hybrid (90% WFH, occasional onsite)About the RoleWe are seeking a Cybersecurity Threat & Vulnerability Analyst to join our growing team. In this role, you will monitor, analyze, and assess emerging...


  • Pasay, National Capital Region, Philippines ACCPRO INTERNATIONAL Full time ₱500,000 - ₱600,000 per year

    We're Hiring: Vulnerability AnalystMOA, Pasay | Hybrid (1 - 2x a month RTO) | MidshiftRequirements:B.S. equivalent in Computer Science, Information Systems, or Cyber Intelligence.1-2 years of minimum professional experience in cybersecurity, with a focus on threat detection, penetration testing, or vulnerability assessment.possess a solid grasp of...


  • Pasay, National Capital Region, Philippines beBeeSecurity Full time $80,000 - $150,000

    Job Title: Cyber Security AnalystWe are seeking a skilled Senior Cyber Security Analyst to join our team. This is an exciting opportunity for individuals who enjoy analyzing complex patterns and behaviors, identifying and investigating anomalous activities within our SaaS security platform.You will be responsible for conducting advanced investigations of...


  • Pasay, National Capital Region, Philippines beBeeThreat Full time $120,000 - $150,000

    Job SummaryAs a seasoned security expert, you will lead the detection, investigation, and response to advanced threats across cloud, endpoint, and web application layers.Utilizing a variety of tools such as EDR, SIEM, SOAR, and threat intelligence platforms, you will perform in-depth analysis of security incidents.You will conduct root cause analysis and...


  • Pasay, National Capital Region, Philippines MicroSourcing Full time

    Cyber Security Administrator (Dayshift - Hybrid)As a Cyber Security Administrator, you will play a critical role in safeguarding the organisation's IT infrastructure and information assets by implementing, monitoring and maintaining robust security measures. You will be responsible for ensuring the security integrity, confidentiality and availability of...

  • Vulnerability Analyst

    3 weeks ago


    Pasay, National Capital Region, Philippines HR TechX Corp. Full time

    OverviewJoin to apply for the Vulnerability Analyst role at HR TechX Corp.Vulnerability Analysts aid in the identification, assessment, and communication of new and emergent threats in the cybersecurity landscape, specifically vulnerability intelligence and detections. As a Vulnerability Analyst, you will be expected to familiarize yourself with high-impact...


  • Pasay, National Capital Region, Philippines ZMG Ward Howell 2 Full time $70,000 - $120,000 per year

    We are seeking a highly skilled and experienced Technical Manager to join our team. The ideal candidate will possess a deep understanding of cybersecurity threats, incident response, and advanced security technologies. You will be responsible for monitoring, analyzing, and responding to security incidents, as well as implementing proactive security measures...


  • Pasay, National Capital Region, Philippines beBeeCryptography Full time $120,000 - $180,000

    Job TitleCyber Security Expert Wanted - Protect Our Platform from Threats!This job involves leveraging expertise in bot detection, web traffic analysis, and deep behavioral analytics to identify and investigate anomalous activities within our security platform. The right candidate will be skilled at analyzing complex patterns and behaviors, and developing...


  • Pasay, National Capital Region, Philippines beBeeCyber Full time ₱900,000 - ₱1,200,000

    ">Job Overview">We are seeking a highly skilled Cyber Security Analyst to join our Security Operations and Incident Response team. The ideal candidate will have expertise in monitoring, triaging, and responding to security events and incidents using advanced tools and established processes.The successful candidate will conduct thorough investigations of...