Aktuelle Jobs

Entdecken und Bewerben Sie sich für Jobs

Lead Threat Intelligence Analyst (m/f/d)

Permanent
Abu Dhabi, United Arab Emirates
03.03.2026

ormation

Job Title Lead Threat Intelligence Analyst

Business Unit Cyber Defense Reporting to Manager - Threat Intelligence

Sub-Business Unit Cyber Resilience Services_Remote Monitoring-Threat Intelligence Job Level Lead Specialist

 

Job Purpose

At CPX, trust is at the heart of everything we do just because it is essential to every part of our connected digital

world. Whether it is enjoying the freedom of a protected internet, secure transactions or safe communications - we

protect, transform and nurture today so that all people can flourish with the freedom to achieve their potential

tomorrow.

 

As a Lead Threat Intelligence Analyst, you will have strong analytical and investigative skills and be capable of

receiving mass data and translate it into bright intelligence findings. You will conduct research and analysis, and

will collaborate to author various analytic documents, identifying findings and presenting hypotheses and

intelligence gaps and recommendations. The analyst will also review weekly, monthly and on demand reports

enabling discussions relating to our mission. The analyst will also contribute to the enhancement of the Threat

Intelligence Center, processes, tool selection and capabilities through continuous innovation.

 

Job Responsibilities

Key Focus Areas

(Up to 7) Key Activities

Key Responsibilities · Collection, analysis and distribution of threat intelligence from multiple sources (All-Source Intelligence) · Manage threat intelligence platforms and monitor feed sources for efficacy · Preparation of intelligence products, including high-quality papers, assessments, briefings, recommendations, and findings. · Develop, manage, optimize and continuously improve processes to enhance the overall cyber threat intelligence function · Develops and validates templates · Validates TIP processes and procedures – assists in authoring · Assist in the definition of corporate intelligence requirements (both inside and outside of the team, to include key business areas or units) based on changes to business needs, structure, priorities and technology · Dissemination of Intel products, to include threat alerts, reports, briefings, etc. · Contribute to situational awareness activities or processes within the organization, and business, providing business context to active or emerging threats · Conduct intelligence assessments to determine key characteristics of the attack, attribution, and actor motivation, intent, and capability. · Enhance the Threat Intelligence Center, processes, tool selection and capabilities through continuous innovation. · Continuous exploration of future TI developments and mentoring of junior team members

AOR (Any Other

Responsibilities) Any other responsibilities as required by the Line Manager

 

 

Integrated Management System (IMS) requirements

· Compliance: Ensure compliance with applicable laws, regulations, and company IMS (Integrated

Management System) policies.

· Acceptable Use of Assets: Ensure compliance to the Acceptable Usage Policy, Company Code of Conduct

and Non-Disclosure Agreements while dealing with any company and/or client information asset(s).

· Data Protection: Always protect company and customer’s sensitive information from unauthorized

access, disclosure, alteration, or destruction.

· IMS Awareness: Participate in information security, business continuity, privacy and IT training and

awareness sessions.

· Reporting: Report any identified information security, business continuity and data privacy related

incident(s), risk(s) and weakness(es) in the technology, processes and daily operations immediately to

the CISO (Chief Information Security Officer) Team.

· Exercising and Testing: Participate and assist, wherever required, in risk assessment activities,

incident simulations, fire drills and business continuity exercises, as and when required.

· Secure Remote Work: Follow guidelines and procedures for remote work, including secure access, data

protection, and adherence to relevant company policies and procedure

Bereit für den nächsten Schritt?

Melden Sie sich online an - es dauert nur 10 Minuten.