Cyber Threat Investigator
看过: 109
更新日: 04-11-2025
类别: IT-软件
行业: IT Services IT Consulting Security Investigations Computer Network Security
水平: Mid-Senior level
工作类型: Contract
工作内容
Job Title: Cyber Threat Intelligence Analyst
Location: Leuven, Belgium (3001)
Start Date: 01 September 2025
End Date: 12-Month Duration (Until ~31 August 2026, with possible extension)
Remote Work: 3 days remote / 2 days onsite
Languages Required: Dutch and English (both mandatory)
Company Overview
Join a leading organization committed to securing its digital assets and protecting critical infrastructure. As part of the Security Operations Center (SOC), you’ll become a vital part of the organization’s cyber defense mission. The SOC is composed of various expert teams, including Cyber Threat Intelligence (CTI), Use Case Design, Tier 1–3 Analysts, and Incident Response.
Mission Context
The Cyber Threat Intelligence (CTI) team plays a strategic role in gathering, analyzing, and disseminating actionable intelligence to mitigate cyber risks. CTI supports both the SOC and wider stakeholders throughout the organization. You’ll be helping to expand services to existing internal clients and onboarding new stakeholders.
Role Summary
As a Cyber Threat Intelligence Analyst, you will:
- Research emerging threats relevant to the business
- Track and analyze threat actors, campaigns, and adversary tactics
- Assess threats and recommend countermeasures
- Collaborate with the broader cybersecurity team (including Use Case Designers, Security Analysts, and Incident Responders)
- Provide high-quality CTI reporting and briefings for stakeholders
- Strengthen detection capabilities and advise on use case improvements
- Liaise with KBC Group CERT and share intelligence for collaborative defense
Key Responsibilities
- Conduct open-source and proprietary threat research
- Identify threat actors, malware families, and techniques used in attacks
- Deliver CTI reports tailored to stakeholder needs
- Map threats to KBC’s IT landscape and prioritize them
- Contribute to threat hunting and use case definition
- Recommend improvements to security architecture and detection mechanisms
- Analyze network traffic, packet captures, and system logs
- Evaluate threat intelligence feeds and sources for relevance and quality
- Align intelligence activities with frameworks such as MITRE ATT&CK, Kill Chain, or Diamond Model
Required Skills & Experience
Technical Competencies
- Strong knowledge of threat impact assessment and cyber risk modeling
- Experience with SIEM tools, log management, and correlation rule design
- Familiarity with EPP, EDR, and open-source security tools
- Skilled in regular expression (RegEx) and natural language query-based log analysis
- Understanding of network forensics, packet capture, and traffic analysis
- Knowledge of encryption, cryptographic protocols, and secure communications
- Prior experience with frameworks like MITRE ATT&CK, Kill Chain, or Diamond Model is highly desirable
最后期限: 19-12-2025
点击免费申请候选人
报告工作
相同的工作
-
⏰ 01-01-2026🌏 Tienen, Flemish Brabant
-
⏰ 30-12-2025🌏 Asse, Flemish Brabant
-
⏰ 25-12-2025🌏 Beersel, Flemish Brabant
-
⏰ 19-12-2025🌏 Asse, Flemish Brabant
-
⏰ 01-01-2026🌏 Leuven, Flemish Brabant
-
⏰ 29-12-2025🌏 Leuven, Flemish Brabant
-
⏰ 27-12-2025🌏 Beersel, Flemish Brabant
-
⏰ 04-01-2026🌏 Leuven, Flemish Brabant
-
⏰ 29-12-2025🌏 Leuven, Flemish Brabant
-
⏰ 04-01-2026🌏 Leuven, Flemish Brabant