Mid-Level Cyber Threat Intelligence - Mumbai
3 weeks ago

Job description
, consectetur adipiscing elit. Nullam tempor vestibulum ex, eget consequat quam pellentesque vel. Etiam congue sed elit nec elementum. Morbi diam metus, rutrum id eleifend ac, porta in lectus. Sed scelerisque a augue et ornare.
Donec lacinia nisi nec odio ultricies imperdiet.
Morbi a dolor dignissim, tristique enim et, semper lacus. Morbi laoreet sollicitudin justo eget eleifend. Donec felis augue, accumsan in dapibus a, mattis sed ligula.
Vestibulum at aliquet erat. Curabitur rhoncus urna vitae quam suscipit
, at pulvinar turpis lacinia. Mauris magna sem, dignissim finibus fermentum ac, placerat at ex. Pellentesque aliquet, lorem pulvinar mollis ornare, orci turpis fermentum urna, non ullamcorper ligula enim a ante. Duis dolor est, consectetur ut sapien lacinia, tempor condimentum purus.
Access all high-level positions and get the job of your dreams.
Similar jobs
Job description · Keep track of APTs groups (advanced persistent threats). · Know APT Groups motivation, their tools techniques, the malware they write, and CC (command and control center), identify their targets. · Threat intelligence analyst must have professional experience in ...
3 days ago
+Analyze and classify threat reports, campaigns, and adversary behavior. Evaluate indicators, TTPs, and end-to-end attack narratives. · +Familiar with MITRE ATT&CK, OSINT collection, or CTI workflows. · Ability to distinguish real attacker behavior from noise or fabricated data. ...
1 month ago
We're looking for analysts who understand adversaries, campaigns, and real-world threat-intelligence workflows. · Analyze and classify threat reports, campaigns, and adversary behaviorEvaluate indicators, TTPs, and end-to-end attack narrativesHelp generate, structure, · and valid ...
2 weeks ago
+ Threat Intelligence Analyst +Analyze and classify threat reports campaigns and adversary behavior Evaluate indicators TTPs and end-to-end attack narratives Help generate structure validate threat-intelligence data used to train assess AI systems Review AI-generated outputs accu ...
1 week ago
Total experience of 5+ years out of which minimum 5 years of experience in Threat intelligence. · ...
1 month ago
Collect and analyze threat intelligence from internal and external sources to produce actionable reports for SOC and security leadership. · ...
3 weeks ago
Proactive threat hunter actively searching for indicators of compromise and malicious activity that traditional security systems may miss. · ...
1 month ago
+ Role : SOC Analyst, L3. Primary Responsibilities include Advanced Cyber Analytics and threat detection incident response activities. · + BE/BSC(Comp/IT) · + + Leverage internal and external resources to research threats vulnerabilities and intelligence on various attackers and ...
3 weeks ago
We have a job opening for a CTI Analyst. As part of our CyberSOC team based in India you will support us on delivering cyber threat intelligence services. · ...
1 month ago
Walk-In/In-Person Hiring Drive-Cyber-D&R-Threat Hunting-AM+DM(4-8 yrs)-Thane-31st Jan(Saturday)
Deloitte
Cyber Threat Hunter · Deloitte helps organizations prevent cyberattacks and protect valuable assets. · Conduct proactive threat hunting using logs, network traffic, and endpoint data. · Develop and test hypotheses based on emerging threat intelligence. · ...
1 week ago
Job summary · Cyber incident handling,root cause analysis · Cyber incident handling · Root cause analysis · ...
3 weeks ago
We are looking for a highly skilled and experienced L3 SOC Analyst to administer our Qradar system in Mumbai. · ...
1 month ago
A Threat Hunter in the SOC proactively searches for advanced threats, suspicious activities, and hidden attack patterns that may bypass traditional security controls. · Proactively hunt for threats across networks, endpoints, servers, and cloud environmentsAnalyze logs, alerts, a ...
1 month ago
The Security Operations Center Analyst will integrate devices with SIEM, configure rules for effective detection, validate and normalize log sources. They will also perform forensic analysis, lead Root Cause Analysis (RCA), coordinate containment and recovery efforts. · ...
1 month ago
Monitor security events and alerts across various platforms, investigate potential security incidents, follow incident response processes. · ...
1 month ago
Troubleshooting of an incident within IT Security · incident response teams of SOC and maintain awareness of new and emerging cyber-attack threats with potential to harm company systems and networks. · ...
1 month ago
A security consultant with 6+ years of experience in incident response and threat intelligence is required. The candidate should have good communication skills, a grasp of basic security principles, and experience with SIEM tools. · ...
1 month ago
We are looking for a Cyber Senior Consultant to join our team. The ideal candidate will have experience with SIEM tools and EDR/XDR platforms. · ...
3 weeks ago
Perform advanced cyber threat analysis and proactive threat hunting using SIEM data. · ...
1 week ago
Lead endpoint security initiatives with a focus on macOS and Linux environments to ensure robust protection against threats. · Deploy, manage, and optimize Endpoint Detection and Response (EDR) tools, with preference for SentinelOne. · Monitor and analyze security alerts using ED ...
3 days ago