470 Threat Intelligence jobs in Indonesia
Cyber Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Company Description
PT Bank Nationalnobu Tbk (Nobu Bank) is committed to addressing the diverse needs of today's banking world. With a vision to reach global standards, the bank steadily enhances its products and services while consistently improving quality. Leveraging the rapid development of the digital world, Nobu Bank ensures its presence through ever-evolving electronic channels to meet the increasing mobile needs of society. Nobu Bank is licensed and regulated by the Financial Services Authority (OJK) and Bank Indonesia (BI), and is a member of the Deposit Insurance Corporation (LPS).
Role Description
This is a full-time on-site role for a Threat Intelligence Analyst located in Kecamatan Karawaci. The Threat Intelligence Analyst will be responsible for monitoring and analyzing cyber threats, creating threat assessments, and developing mitigation strategies. The analyst will also collect and analyze data from various sources to identify potential security risks, work closely with the cybersecurity team to enhance threat detection, and provide actionable intelligence to support incident response efforts. Additionally, the role involves staying informed about the latest cybersecurity trends and hacking techniques.
Qualifications
- Experience in monitoring and analyzing cyber threats
- Knowledge of threat assessment and mitigation strategies
- Proficiency in data collection and analysis from various sources
- Strong understanding of cybersecurity trends and hacking techniques
- Excellent problem-solving and analytical skills
- Ability to work well in a team and communicate effectively
- Relevant certifications such as CEH, CISSP, or equivalent are a plus
- Bachelor's degree in Cybersecurity, Information Technology, or a related field
- Experience in the banking or financial sector is highly desirable
- Fresh Graduates are welcome
Cyber Threat Intelligence Analyst
Posted 6 days ago
Job Viewed
Job Description
The successful candidate will be responsible for gathering, analyzing, and disseminating threat intelligence to proactively defend against cyber adversaries. You will play a critical role in understanding emerging threats, actor tactics, techniques, and procedures (TTPs), and translating this intelligence into actionable security measures. Your insights will help the organization anticipate and mitigate potential risks before they impact operations.
Key Responsibilities:
- Monitor and analyze open-source intelligence (OSINT), dark web forums, and threat feeds for emerging threats and adversary activity.
- Investigate and attribute threat actors and their campaigns targeting the organization or industry.
- Develop and maintain threat intelligence reports, providing actionable insights to security operations, incident response, and executive leadership.
- Correlate threat intelligence with internal security data to identify potential compromises or vulnerabilities.
- Build and manage relationships with threat intelligence vendors and information sharing communities.
- Develop and refine threat models based on intelligence gathered.
- Create and maintain threat intelligence platforms and tools.
- Provide subject matter expertise on threat actor capabilities and TTPs.
- Support incident response activities by providing timely and relevant intelligence.
- Contribute to the development of proactive defense strategies based on intelligence findings.
- Conduct research on specific threat actors, malware, and attack vectors.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent practical experience.
- Minimum of 3 years of experience in cyber threat intelligence, security operations, or incident response.
- Strong understanding of geopolitical factors influencing cyber threats.
- Proficiency in analyzing various types of threat data (IOCs, TTPs, actor profiles).
- Experience with threat intelligence platforms (TIPs), SIEM, and EDR solutions.
- Excellent research, analytical, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to present complex information clearly.
- Familiarity with scripting languages (e.g., Python) for data analysis is a plus.
- Knowledge of various operating systems and network protocols.
- Relevant certifications such as GCTI, CTIA, or others are advantageous.
Cyber Threat Intelligence Analyst
Posted 8 days ago
Job Viewed
Job Description
Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Company Description
PT Bank Nationalnobu Tbk (Nobu Bank) is committed to addressing the diverse needs of today's banking world. With a vision to reach global standards, the bank steadily enhances its products and services while consistently improving quality. Leveraging the rapid development of the digital world, Nobu Bank ensures its presence through ever-evolving electronic channels to meet the increasing mobile needs of society. Nobu Bank is licensed and regulated by the Financial Services Authority (OJK) and Bank Indonesia (BI), and is a member of the Deposit Insurance Corporation (LPS).
Role Description
This is a full-time on-site role for a Threat Intelligence Analyst located in Kecamatan Karawaci. The Threat Intelligence Analyst will be responsible for monitoring and analyzing cyber threats, creating threat assessments, and developing mitigation strategies. The analyst will also collect and analyze data from various sources to identify potential security risks, work closely with the cybersecurity team to enhance threat detection, and provide actionable intelligence to support incident response efforts. Additionally, the role involves staying informed about the latest cybersecurity trends and hacking techniques.
Qualifications
- Experience in monitoring and analyzing cyber threats
- Knowledge of threat assessment and mitigation strategies
- Proficiency in data collection and analysis from various sources
- Strong understanding of cybersecurity trends and hacking techniques
- Excellent problem-solving and analytical skills
- Ability to work well in a team and communicate effectively
- Relevant certifications such as CEH, CISSP, or equivalent are a plus
- Bachelor's degree in Cybersecurity, Information Technology, or a related field
- Experience in the banking or financial sector is highly desirable
Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
As Threat Intelligence Analyst you will play a critical role in safeguarding the organization's digital ecosystem by identifying vulnerabilities, conducting penetration tests, and analyzing emerging threats. You will collaborate with cross functional teams to strengthen security posture, apply industry best practices, and provide actionable insights that mitigate risks and protect business operations.
Qualifications :
- Bachelor's degree or equivalent in Computer Science, Information Systems, Cybersecurity, or a related field.
- Minimum of 2 years of hands-on experience as a
Security Analyst, Penetration Tester, or Cyber Threat Intelligence Specialist. - Proven experience in conducting
Vulnerability Assessments, Penetration Testing, and Threat Intelligence analysis
. - Strong ability to analyze threats based on findings from Vulnerability Assessments, Penetration Testing results, and Threat Intelligence data.
- Solid understanding of vulnerability identification and risk assessment methodologies, particularly OWASP standards.
- Proficiency in utilizing and interpreting results from leading security assessment tools (e.g., Burp Suite, Nessus, Metasploit, Threat Intelligence platforms).
- Practical knowledge and experience in applying Information Security and Cybersecurity best practices (ISO 27001, NIST-CSF, CIS Controls).
- Good understanding of Network Protocols, Secure SDLC practices, and Data Center infrastructure.
- Active participation in skill development programs such as Red Team exercises, Capture the Flag (CTF) competitions, Bug Bounty programs, or Open-Source Security projects will be a strong advantage.
Relevant certifications are highly preferred, including but not limited to:
CompTIA Cybersecurity Analyst (CySA+)
- CEH (Certified Ethical Hacker)
- CPENT (Certified Penetration Testing Professional)
- OSCP (Offensive Security Certified Professional)
- CISSP (Certified Information Systems Security Professional)
- Other equivalent cybersecurity certifications are considered a plus.
Job Description :
- Conduct vulnerability assessments, validate threats, and provide recommendations for remediation.
- Perform penetration testing to identify weaknesses and vulnerabilities within the company's systems.
- Implement system hardening on operating systems, networks, and applications in accordance with best practices.
- Monitor, respond to, and validate information from Threat Intelligence platforms to detect vulnerabilities and threats targeting the company's digital assets.
- Validate threats and provide
Indicators of Compromise (IoCs)
. - Identify
Indicators of Attack (IoAs)
as well as
Tactics, Techniques, and Procedures (TTPs)
based on the MITRE ATT&CK framework. - Monitor, respond to, and evaluate the effectiveness of security detections for
Active Directory
and
Email Security
. - Provide recommendations to relevant teams to remediate security gaps and mitigate potential cyberattacks.
- Collaborate with Security Analysts to manage and respond to cybersecurity incidents.
- Work closely with stakeholders and external teams to identify and remediate system vulnerabilities.
- Prepare and deliver periodic cybersecurity reports based on detected threats and attack patterns.
Senior Cyber Threat Intelligence Analyst
Posted 8 days ago
Job Viewed
Job Description
Responsibilities:
- Proactively research and monitor the threat landscape for relevant threats, including nation-state actors, cybercriminals, and hacktivist groups.
- Analyze threat data from various sources (open source, commercial feeds, internal logs) to identify trends, patterns, and indicators of compromise (IOCs).
- Develop and maintain threat actor profiles, including their motivations, tactics, techniques, and procedures (TTPs).
- Produce high-quality intelligence reports, briefings, and alerts for different audiences, from technical teams to executive leadership.
- Support incident response activities by providing timely and relevant threat context.
- Develop and refine threat hunting hypotheses based on intelligence gathered.
- Collaborate with internal security teams (SOC, DFIR, GRC) to operationalize threat intelligence.
- Build and maintain relationships with external intelligence communities and information-sharing forums.
- Contribute to the development and improvement of threat intelligence tools and platforms.
- Mentor junior analysts and share knowledge across the security organization.
- Stay current with the latest cyber threat intelligence methodologies and technologies.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Intelligence Studies, or a related field, or equivalent experience.
- Minimum of 6 years of experience in cyber threat intelligence analysis or a related cybersecurity discipline.
- Demonstrated experience in analyzing malware, network traffic, and security logs.
- Proficiency with threat intelligence platforms (TIPs) and security information and event management (SIEM) tools.
- Strong understanding of attack vectors, exploit techniques, and common TTPs used by adversaries.
- Experience in geopolitical analysis and its impact on cyber threats is a plus.
- Excellent written and verbal communication skills, with the ability to articulate complex information clearly.
- Strong research, analytical, and critical thinking skills.
- Ability to work independently and manage multiple priorities in a fast-paced, remote environment, supporting our global client base, including operations near Surabaya, East Java, ID .
- Relevant certifications such as GIAC Certified Cyber Threat Intelligence (GCTI) or equivalent are highly valued.
Information Security Analyst (Cyber Threat Intelligence)
Posted 5 days ago
Job Viewed
Job Description
Key responsibilities include gathering intelligence from various sources (e.g., open-source intelligence, threat feeds, incident response data), performing in-depth analysis of threat actor tactics, techniques, and procedures (TTPs), and developing actionable threat intelligence reports for different stakeholders. You will also collaborate with incident response teams to provide timely and relevant threat context during security incidents. A Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field is preferred. Relevant certifications such as CompTIA Security+, CEH, or GIAC certifications are a significant plus. Excellent analytical, critical thinking, and communication skills are essential. As part of the hybrid arrangement, you will be expected to work collaboratively in our office in Denpasar, Bali, ID , for a portion of the week, with the remainder of your time spent working remotely. If you are passionate about staying ahead of cyber threats and contributing to a robust security posture, we encourage you to apply.
Be The First To Know
About the latest Threat intelligence Jobs in Indonesia !
Associate Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
COMPANY DESCRIPTION
PT Korelasi Persada Indonesia is an information security solution and services company located in Tangerang. Co-found by experienced information technology professionals, it was established to serve corporate partners in planning, building, and operating the right information security solutions to improve business efficiency. We tend to help organizations to reduce risk, demonstrate compliance, enhance agility, and pursue strategic goals with greater confidence Our mission is to become the premier information security services company of choice in Indonesia and deliver high quality information security services that exceeds customer satisfaction.
Role and Responsibilities
- Monitor, track, and validate Threat Intelligence Platform Finding (TIP) of cyber threats, attack patterns, and adversary tactics, techniques, and procedures (TTPs) to identify potential risks and vulnerabilities.
- Collect and analyze threat data from various sources, including open-source intelligence (OSINT), dark web forums, and proprietary threat feeds.
- Produce timely and actionable threat intelligence reports and alerts for internal stakeholders and Customers.
- Collaborate with cross-functional teams to identify and mitigate potential security vulnerabilities.
- Stay abreast of the latest Emerging Threat.
Qualifications and Education Requirements
- Bachelor's degree in Computer Science, Cybersecurity, or a related field.
- Fresh graduates are welcome to apply.
- 1–3 years of experience in a cybersecurity role, preferably with a focus on threat intelligence analysis
- Possession of CTIA (Certified Threat Intelligence Analyst) certification will be an advantage
Preferred Skills
- Experience working in online intelligence investigations and analysis, including good OSINT skills.
- Technical experience with Threat Intelligence tools such as Passive DNS, Network Flow Analysis, Maltego, Virus Total, URLScan, MISP and OpenCTI.
- A general understanding of endpoint telemetry, adversary behaviors, and MITRE ATT&CK.
- Good understanding of CVSS SCORE and TLP.
- Proficiency in using threat intelligence platforms, SIEM tools, and other security technologies.
- Strong understanding of cyber threats, attack vectors, and common exploitation techniques.
- Familiar Use industry standard protocols such at STIX and TAXII.
- Familiar With SIGMA and YARA is desirable.
- Strong scripting Python.
- Excellent communication and presentation skills, with the ability to convey technical information to both technical and non-technical audiences.
Lead Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Develop and execute a comprehensive threat intelligence strategy.
- Monitor open-source, deep web, and dark web sources for emerging threats and adversary activity.
- Analyze threat actor TTPs, motivations, and capabilities to predict future attacks.
- Produce timely and actionable intelligence reports tailored to different stakeholders (technical teams, executive leadership).
- Manage and leverage threat intelligence platforms (TIPs) and other security tools.
- Collaborate with incident response, security operations, and vulnerability management teams to integrate intelligence.
- Conduct malware analysis and reverse engineering as needed to understand threat actor techniques.
- Build relationships with external intelligence sharing communities and partners.
- Mentor junior analysts and contribute to the development of the threat intelligence function.
- Identify and track key threat actors relevant to the organization's industry and operations.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field; Master's degree preferred.
- Minimum of 6 years of experience in cybersecurity, with at least 3 years specifically focused on threat intelligence.
- Proven experience in analyzing diverse sources of threat data and producing high-quality intelligence products.
- Deep understanding of cyber threat landscapes, malware, exploit techniques, and adversarial TTPs.
- Proficiency with threat intelligence platforms, SIEM tools, and data analysis techniques.
- Strong analytical, research, and critical thinking skills.
- Excellent written and verbal communication skills, with the ability to explain complex technical information clearly.
- Relevant certifications such as GCTI, CCTIM, or CTIA are highly desirable.
- Demonstrated ability to work independently and lead initiatives in a remote-first environment.
- Familiarity with geopolitical factors influencing cyber threats is a plus.
Senior Threat Intelligence Analyst
Posted today
Job Viewed
Job Description
The Senior Threat Intelligence Analyst will be responsible for collecting, processing, and analyzing vast amounts of data from various sources, including open-source intelligence (OSINT), dark web monitoring, and internal security telemetry. You will develop actionable intelligence reports, provide strategic insights to security leadership, and contribute to the continuous improvement of the threat intelligence program. This role requires a deep understanding of the threat landscape, attacker methodologies, and security technologies.
Key Responsibilities:
- Continuously monitor and analyze global cyber threat intelligence feeds, news, and forums to identify emerging threats, trends, and attacker activities.
- Conduct in-depth research on threat actors, their motivations, capabilities, and tactics, techniques, and procedures (TTPs).
- Develop and maintain threat intelligence platforms and databases.
- Produce high-quality, actionable threat intelligence reports, briefings, and alerts for various stakeholders, including security operations, incident response, and executive leadership.
- Correlate threat intelligence with internal security events and incidents to enhance detection and response capabilities.
- Develop and refine threat hunting hypotheses based on intelligence gathered.
- Contribute to the development of security strategies and recommendations to mitigate identified risks.
- Collaborate with internal security teams (SOC, IR, Vulnerability Management) to operationalize threat intelligence.
- Stay abreast of the latest cybersecurity threats, vulnerabilities, and attack vectors.
- Mentor junior threat intelligence analysts and contribute to the team's overall knowledge base.
- Represent the company in threat intelligence communities and forums as needed.
- Automate intelligence collection, processing, and dissemination workflows where possible.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Master's degree or relevant certifications (e.g., GCTI, CTI) are a strong plus.
- Minimum of 5-7 years of experience in threat intelligence, cybersecurity analysis, or a related security operations role.
- Proven experience in collecting, analyzing, and reporting on cyber threats, including malware analysis, APT research, and campaign tracking.
- Proficiency with threat intelligence platforms, SIEM tools, and data analysis tools.
- Strong understanding of various operating systems (Windows, Linux, macOS), networking protocols, and security concepts.
- Experience with scripting languages (e.g., Python, PowerShell) for automation and data analysis is highly desirable.
- Excellent analytical, critical thinking, and problem-solving skills.
- Superior written and verbal communication skills, with the ability to clearly articulate complex technical information to diverse audiences.
- Ability to work independently and collaboratively in a remote environment.
- Demonstrated ability to manage multiple projects and deadlines effectively.
- Familiarity with frameworks such as MITRE ATT&CK is essential.