Current jobs related to Threat Intelligence Analyst - Abu Dhabi, Abu Dhabi - CPX
-
Lead - Threat Intelligence
6 days ago
Abu Dhabi, Abu Dhabi, United Arab Emirates CPX Full timeAt CPX, trust is at the heart of everything we do just because it is essential to every part of our connected digital world. Whether it is enjoying the freedom of a protected internet, secure transactions or safe communications - we protect, transform and nurture today so that all people can flourish with the freedom to achieve their potential tomorrow.As a...
-
Manager - Threat Intelligence
6 days ago
Abu Dhabi, Abu Dhabi, United Arab Emirates CPX Full timeJob PurposeThe Threat Intelligence Manager is an integral part of the Threat Intelligence Center. As the Threat Intelligence Manager, you will be leading a team of highly skilled Cyber Threat Intelligence Analysts to ensure that cyber threat intelligence is properly collected, analyzed, and disseminated. You will be a natural leader along with drive and...
-
Security Operations Center Analyst L2
2 weeks ago
Abu Dhabi, Abu Dhabi, United Arab Emirates ZENDATA Cybersecurity Full timeJob Title: Senior SOC Analyst L2Location: Abu DhabiJob Type: Full-timeExperience Level: 5+ YearsJob Summary:We are seeking a Senior Cyber Security Operations Center (SOC) Analyst with a strong background in Incident Response (IR), Digital Forensics (host/cloud), and Malware Analysis. The ideal candidate will play a key role in detecting, analyzing, and...
-
Lead Analyst
6 days ago
Abu Dhabi, Abu Dhabi, United Arab Emirates CPX Full timeOverviewThe Lead SOC Analyst is responsible for managing the day-to-day activities of the SOC Monitoring, Incident Detection, and Response Operations. The role involves collaborating with internal and client teams to identify and respond to threats and vulnerabilities and providing technical expertise and guidance to support incident response efforts. This...
-
Senior Analyst
3 days ago
Abu Dhabi, Abu Dhabi, United Arab Emirates CPX Full timeJob PurposeThe Security Operations Centre team at CPX is a cross-functional Operations/ Engineering team involved at all phases of our application and service release lifecycle that embraces the SecOps communication, collaboration, and integration method. The Senior Security Analyst is responsible for leading security monitoring efforts, analyzing various...
-
Business Intelligence Analyst
1 week ago
Abu Dhabi, Abu Dhabi, United Arab Emirates M42 Health Full timeOverviewM42 delivers comprehensive healthcare services across the full continuum of care; from primary care to advanced specialty treatments. Leveraging cutting-edge health technologies and precision medicine, we ensure the highest standards of effectiveness, efficiency, and patient-centered outcomes. With a global presence spanning more than 480 facilities...
-
Analyst - SOC Monitoring ()
1 week ago
Abu Dhabi, Abu Dhabi, United Arab Emirates CPX Full timeOverviewTo monitor, detect, analyze, and respond to security incidents and threats in an organization's information systems and network infrastructure. You aim to protect sensitive data, uphold network security, and maintain organizational compliance with industry regulations and standards. By utilizing cutting-edge security tools, techniques, and...
-
Analyst - SOC Monitoring (CPX)
1 week ago
Abu Dhabi, Abu Dhabi, United Arab Emirates CPX Holding L.L.C O.P.C Full timeOverview: To monitor, detect, analyze, and respond to security incidents and threats in an organization's information systems and network infrastructure. You aim to protect sensitive data, uphold network security, and maintain organizational compliance with industry regulations and standards. By utilizing cutting-edge security tools, techniques, and...
-
Business Analyst
2 weeks ago
Abu Dhabi, Abu Dhabi, United Arab Emirates Contango Full timeAbout the RoleWe are theData & AI Hub— building the foundation for data intelligence and AI innovation across our ecosystem. Our mission is to enable scalable, secure, and high-impact data and machine learning capabilities that power decision-making, digital products, and AI-driven experiences.As part of a growing technology organization, you'll join a...
-
Security Analyst
3 days ago
Abu Dhabi, Abu Dhabi, United Arab Emirates Core42 Full timeOverviewAbout UsCore42, a leader in AI-powered cloud and digital infrastructure, is driving transformative technology solutions globally. Leveraging advanced resources and partnerships, Core42 empowers clients to harness sovereign AI infrastructure, especially in sectors with stringent regulatory needs. With a mission to redefine digital transformation, we...
Threat Intelligence Analyst
2 weeks ago
Overview
The Threat Intelligence Analyst is a core member of the Threat Intelligence Center, responsible for identifying, analyzing, and reporting on cyber threats targeting national critical infrastructure and enterprise systems. This role focuses on intrusion analysis, malware reverse engineering, and threat actor tracking across the surface, deep, and dark web. The analyst will transform raw technical data into actionable intelligence to support investigations, incident response, and proactive defense strategies.
Responsibilities
Intrusion Analysis
- Analyze network telemetry, endpoint logs, and threat data to identify malicious activity and intrusion attempts.
- Correlate indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) with threat actor campaigns.
- Support incident response teams with threat context, attribution, and post-incident intelligence reporting.
- Develop detection logic using Sigma, Snort, and custom scripts to identify emerging threats.
Malware Analysis & Reverse Engineering
- Perform static and dynamic analysis of malware samples using tools such as Ghidra, IDA Pro, x64dbg, and Cuckoo Sandbox.
- Reverse engineer obfuscated binaries and scripts to extract payloads, persistence mechanisms, and C2 infrastructure.
- Create YARA rules and behavioral signatures to detect malware variants and families.
- Maintain a malware repository and contribute to threat hunting and detection engineering efforts.
Surface, Deep, and Dark Web Intelligence Collection
- Monitor underground forums, encrypted messaging platforms, and marketplaces for threat actor activity, data leaks, and exploit development.
- Use TOR, I2P, and specialized tooling to collect intelligence on cybercriminal operations and APT chatter.
- Identify and report on targeted threats, credential dumps, and mentions of organizational assets.
- Collaborate with law enforcement and intelligence-sharing communities when necessary.
Threat Intelligence Operations
- Produce high-quality intelligence products including technical reports, threat assessments, and adversary profiles.
- Manage and optimize threat intelligence platforms (TIPs) and integrate feeds into SIEM and SOAR systems.
- Develop and refine threat models using frameworks such as MITRE ATT&CK, Diamond Model, and the Cyber Kill Chain.
- Build and manage SIEM use cases based on threat intelligence findings.
Qualifications
Required Skills & Experience
- Minimum 7 years of experience in cyber threat intelligence, malware analysis, or intrusion detection.
- Strong understanding of threat actor methodologies, APT groups, and cybercrime ecosystems.
- Proficiency in malware analysis tools (Ghidra, IDA Pro, Cuckoo, etc.) and packet analysis tools (Wireshark, tcpdump).
- Experience with threat intelligence platforms (MISP, ThreatConnect, Recorded Future) and SIEMs (Splunk, QRadar, Elastic).
- Hands-on experience with scripting languages (Python, PowerShell, Bash) for automation and enrichment.
- Familiarity with STIX/TAXII, YARA, OpenIOC, and other intelligence sharing formats.
Preferred Qualifications
- Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience).
- Certifications: GREM, GCTI, GCIH, CISSP, or equivalent.
- Experience in large-scale security operations (enterprise, military, or government).
- Strong analytical and investigative skills with the ability to synthesize complex data into actionable insights.
- Experience integrating threat intelligence into SOC workflows and detection pipelines.