Position: Mid-Senior level

Job type: Contract

Loading ...

Job content

Job Title: Cyber Threat Intelligence Analyst

Location: Leuven, Belgium (3001)

Start Date: 01 September 2025

End Date: 12-Month Duration (Until ~31 August 2026, with possible extension)

Remote Work: 3 days remote / 2 days onsite

Languages Required: Dutch and English (both mandatory)

Company Overview

Join a leading organization committed to securing its digital assets and protecting critical infrastructure. As part of the Security Operations Center (SOC), you’ll become a vital part of the organization’s cyber defense mission. The SOC is composed of various expert teams, including Cyber Threat Intelligence (CTI), Use Case Design, Tier 1–3 Analysts, and Incident Response.

Mission Context

The Cyber Threat Intelligence (CTI) team plays a strategic role in gathering, analyzing, and disseminating actionable intelligence to mitigate cyber risks. CTI supports both the SOC and wider stakeholders throughout the organization. You’ll be helping to expand services to existing internal clients and onboarding new stakeholders.

Role Summary

As a Cyber Threat Intelligence Analyst, you will:

  • Research emerging threats relevant to the business
  • Track and analyze threat actors, campaigns, and adversary tactics
  • Assess threats and recommend countermeasures
  • Collaborate with the broader cybersecurity team (including Use Case Designers, Security Analysts, and Incident Responders)
  • Provide high-quality CTI reporting and briefings for stakeholders
  • Strengthen detection capabilities and advise on use case improvements
  • Liaise with KBC Group CERT and share intelligence for collaborative defense

Key Responsibilities

  • Conduct open-source and proprietary threat research
  • Identify threat actors, malware families, and techniques used in attacks
  • Deliver CTI reports tailored to stakeholder needs
  • Map threats to KBC’s IT landscape and prioritize them
  • Contribute to threat hunting and use case definition
  • Recommend improvements to security architecture and detection mechanisms
  • Analyze network traffic, packet captures, and system logs
  • Evaluate threat intelligence feeds and sources for relevance and quality
  • Align intelligence activities with frameworks such as MITRE ATT&CK, Kill Chain, or Diamond Model

Required Skills & Experience

Technical Competencies

  • Strong knowledge of threat impact assessment and cyber risk modeling
  • Experience with SIEM tools, log management, and correlation rule design
  • Familiarity with EPP, EDR, and open-source security tools
  • Skilled in regular expression (RegEx) and natural language query-based log analysis
  • Understanding of network forensics, packet capture, and traffic analysis
  • Knowledge of encryption, cryptographic protocols, and secure communications
  • Prior experience with frameworks like MITRE ATT&CK, Kill Chain, or Diamond Model is highly desirable
Loading ...
Loading ...

Deadline: 19-12-2025

Click to apply for free candidate

Apply

Loading ...

SIMILAR JOBS

Loading ...
Loading ...