Job Description
Senior Cyber Threat Intelligence📍 Location: Masaken Sheraton, Heliopolis🏢 Company: Travware📌 Work Type: On-siteAbout the RoleWe are seeking a Cyber Threat Intelligence (CTI) Analyst to proactively identify, collect, and analyze databases and data leaks relevant to our organization’s needs. This analyst will be responsible for sourcing data feeds—particularly from underground forums, ransomware blogs, dark web marketplaces, and open-source intelligence (OSINT) platforms—to support internal teams with actionable intelligence and high-quality data for further processing. Key Responsibilities:• Identify and monitor sources of leaked databases, including dark web forums, ransomware blogs, Telegram channels, and underground marketplaces.• Collect, process, and analyze threat intelligence data from a wide range of open and closed sources, ensuring relevance and reliability.• Track threat actors, ransomware operations, and emerging cybercriminal trends to anticipate and detect new data leaks or breaches.• Collaborate with internal teams (e.g., engineering, security operations) to ensure the timely delivery of curated databases for ingestion and analysis.• Maintain up-to-date knowledge of the threat landscape, including new data leak platforms, breach forums, and evolving attacker tactics.• Produce clear, actionable intelligence reports and briefings for technical and non-technical stakeholders.• Support incident investigations by providing intelligence on the provenance and context of leaked data.• Evaluate and improve intelligence collection methodologies and tools as needed. Required Skills & Qualifications:• Experience in cyber threat intelligence, with a focus on dark web monitoring, OSINT, and data leak discovery.• Proficiency in using threat intelligence platforms, OSINT tools, and techniques for data collection and analysis.• Strong analytical and problem-solving skills; ability to assess the credibility and value of data sources.• Familiarity with threat intelligence frameworks (e.g., MITRE ATT&CK) and investigative models.• Excellent written and verbal communication skills for producing intelligence reports.Required Qualifications:Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience).5+ years of experience in cybersecurity or a related IT field.Strong knowledge of security principles, network protocols, and operating systems.Experience with SIEM, firewalls, IDS/IPS, endpoint protection, and forensic tools.Familiarity with scripting (Python, Bash, PowerShell) for automation.Understanding of security frameworks (e.g., NIST, CIS Controls, MITRE ATT&CK).Excellent analytical, problem-solving, and communication skills.
Job Application Tips
- Tailor your resume to highlight relevant experience for this position
- Write a compelling cover letter that addresses the specific requirements
- Research the company culture and values before applying
- Prepare examples of your work that demonstrate your skills
- Follow up on your application after a reasonable time period