Cyber Threat Investigator
View: 109
Update day: 04-11-2025
Location: Leuven Flemish Brabant
Category: IT - Software
Industry: IT Services IT Consulting Security Investigations Computer Network Security
Position: Mid-Senior level
Job type: Contract
Job content
Job Title: Cyber Threat Intelligence Analyst
Location: Leuven, Belgium (3001)
Start Date: 01 September 2025
End Date: 12-Month Duration (Until ~31 August 2026, with possible extension)
Remote Work: 3 days remote / 2 days onsite
Languages Required: Dutch and English (both mandatory)
Company Overview
Join a leading organization committed to securing its digital assets and protecting critical infrastructure. As part of the Security Operations Center (SOC), you’ll become a vital part of the organization’s cyber defense mission. The SOC is composed of various expert teams, including Cyber Threat Intelligence (CTI), Use Case Design, Tier 1–3 Analysts, and Incident Response.
Mission Context
The Cyber Threat Intelligence (CTI) team plays a strategic role in gathering, analyzing, and disseminating actionable intelligence to mitigate cyber risks. CTI supports both the SOC and wider stakeholders throughout the organization. You’ll be helping to expand services to existing internal clients and onboarding new stakeholders.
Role Summary
As a Cyber Threat Intelligence Analyst, you will:
- Research emerging threats relevant to the business
- Track and analyze threat actors, campaigns, and adversary tactics
- Assess threats and recommend countermeasures
- Collaborate with the broader cybersecurity team (including Use Case Designers, Security Analysts, and Incident Responders)
- Provide high-quality CTI reporting and briefings for stakeholders
- Strengthen detection capabilities and advise on use case improvements
- Liaise with KBC Group CERT and share intelligence for collaborative defense
Key Responsibilities
- Conduct open-source and proprietary threat research
- Identify threat actors, malware families, and techniques used in attacks
- Deliver CTI reports tailored to stakeholder needs
- Map threats to KBC’s IT landscape and prioritize them
- Contribute to threat hunting and use case definition
- Recommend improvements to security architecture and detection mechanisms
- Analyze network traffic, packet captures, and system logs
- Evaluate threat intelligence feeds and sources for relevance and quality
- Align intelligence activities with frameworks such as MITRE ATT&CK, Kill Chain, or Diamond Model
Required Skills & Experience
Technical Competencies
- Strong knowledge of threat impact assessment and cyber risk modeling
- Experience with SIEM tools, log management, and correlation rule design
- Familiarity with EPP, EDR, and open-source security tools
- Skilled in regular expression (RegEx) and natural language query-based log analysis
- Understanding of network forensics, packet capture, and traffic analysis
- Knowledge of encryption, cryptographic protocols, and secure communications
- Prior experience with frameworks like MITRE ATT&CK, Kill Chain, or Diamond Model is highly desirable
Deadline: 19-12-2025
Click to apply for free candidate
Report job
SIMILAR JOBS
-
⏰ 01-01-2026🌏 Tienen, Flemish Brabant
-
⏰ 30-12-2025🌏 Asse, Flemish Brabant
-
⏰ 25-12-2025🌏 Beersel, Flemish Brabant
-
⏰ 19-12-2025🌏 Asse, Flemish Brabant
-
⏰ 01-01-2026🌏 Leuven, Flemish Brabant
-
⏰ 29-12-2025🌏 Leuven, Flemish Brabant
-
⏰ 27-12-2025🌏 Beersel, Flemish Brabant
-
⏰ 04-01-2026🌏 Leuven, Flemish Brabant
-
⏰ 29-12-2025🌏 Leuven, Flemish Brabant
-
⏰ 04-01-2026🌏 Leuven, Flemish Brabant