




Job Summary: Work in cyber threat intelligence, collecting, organizing, and analyzing IOCs, supporting incident investigations and monitoring emerging threats. Key Highlights: 1. Cyber threat intelligence work 2. Incident investigation support and threat monitoring 3. Familiarity with threat analysis tools Perform **cyber threat intelligence** activities, supporting the collection, organization, and preliminary analysis of Indicators of Compromise (IOCs) from various information sources. The professional will contribute to basic incident investigations and monitoring of emerging threats, supporting more experienced analysts in producing intelligence analyses and reports. ### **Responsibilities** * Assist in collecting Indicators of Compromise (IOCs) from open-source intelligence (OSINT) * Classify and organize alerts and information related to cyber threats * Support initial investigations related to phishing and malware * Maintain updated repositories of threat indicators and threat information * Support the preparation of intelligence briefings and reports ### **Requirements** * Basic knowledge of networks and protocols (TCP/IP, DNS, and security protocols) * Familiarity with threat analysis tools and platforms (e.g., VirusTotal, Shodan, AbuseIPDB) * Ability to perform basic queries on threat intelligence feeds * Basic programming knowledge, preferably **Python** * Familiarity with virtualized environments, containers, or Docker **Desirable** * Familiarity with threat intelligence frameworks and standards (MITRE ATT\&CK, STIX/TAXII, or MISP) * Knowledge of other programming languages such as **C or Ruby** * Introductory courses or certifications in cybersecurity or cyber threat intelligence


