Job Title: Cyber Threat Intelligence AnalystContract type : freelanceLocation: Leuven (part-time onsite)Start: ASAPDescription:As a senior Information Security Engineer, you have over 5 years of experience in proactively and reactively monitoring and remedying security breaches:Usually, you are part of the SOC (Security Operations Center);You investigate suspicious activities and take remediating actions;You maintain Security Monitoring Tools to effectively secure and monitor the different systems;You perform penetration tests to find any flaws;You document, test and monitor any security breaches and assess their damage.Join the World of Cyber Security – Become a Cyber Threat Intelligence AnalystWelcome to the dynamic world of Cyber Security!At the heart of our defense against cyber threats lies the Security Operations Center (SOC). The SOC is composed of several specialized teams, each playing a crucial role in protecting the organization:Cyber Threat Intelligence (CTI) gathers data on potential threats, contextualizes it within the organization, and delivers actionable insights to support decision-making and trigger new alerts.Use Case Design ensures that the infrastructure is equipped with the right triggers to detect potential threats.Security Analysts (T1/T2/T3) investigate alerts when they are triggered.Cyber Security Incident Response Team (CSIRT) coordinates the response when alerts escalate into full-scale incidents.We are currently looking for a Cyber Threat Intelligence Analyst to join the SOC.The CTI team supports not only the SOC but also a wide range of stakeholders across the organization, each relying on CTI insights for their specific domains.Key Challenges for CTI in the Short to Medium Term:Expanding services to existing stakeholdersEstablishing service delivery for new stakeholdersYour Role as a Cyber Threat Intelligence AnalystAs a Security Threat Intelligence Analyst, you will provide intelligence on threats and threat actors, assess the risks they pose to the IT environment, and recommend enhancements to security controls. You will:Conduct research on emerging threats relevant to the organizationIdentify and classify threat actors and campaignsPrepare and present CTI reports to the cybersecurity communityUnderstand critical IT assets and security controlsCollaborate on threat hunting and use case developmentAnalyze adversary tactics and identify gaps in defensesRecommend improvements to the security architectureReview and interpret external threat intelligence sources and reportsSuggest enhancements to detection use cases based on internal and external insightsLiaise with external CERT teams to share intelligence and foster collaborationKey Competencies for Success:Strong knowledge of threat impact assessment techniquesExperience supporting use case design and correlation rule developmentFamiliarity with log management and SIEM toolsProficiency with commercial and open-source security tools (e.g., EPP, EDR, SIEM)Skilled in log analysis using regular expressions and natural language queriesUnderstanding of network traffic analysis and packet captureSolid grasp of encryption and cryptographyFamiliarity with frameworks like MITRE ATT&CK, Kill Chain, or the Diamond Model is a strong plusYour Ideal Profile:Passionate about cyber securityStrong understanding of enterprise IT infrastructureSkilled at building partnerships with new stakeholdersExcellent at researching and synthesizing informationAble to communicate clearly and effectively to diverse audiencesApply here or send your applications to : nouhayla@synctiv.be