- Lead intelligence-driven threat analysis and translate global threat feeds into actionable mitigation strategies.
- Perform proactive threat hunting using Indicators of Compromise (IOCs), Tactics, Techniques and Procedures (TTPs), and behavioural analytics.
- Correlate intelligence from multiple sources (open source, commercial feeds, ISACs, government advisories) to assess enterprise risk exposure.
- Produce executive-ready intelligence briefings and threat landscape reports for senior stakeholders.
- Map threat intelligence insights against the MITRE ATT&CK framework to identify control and detection gaps.
- Partner with SOC and engineering teams to enhance detection use cases and improve response playbooks.
- Drive continuous improvement of prevention and monitoring capabilities aligned with evolving adversary techniques.
- Support regulatory and internal security requirements through threat-informed risk assessments and resilience exercises.
- Lead cyber awareness initiatives, phishing simulations, and intelligence-sharing programmes to uplift organizational readiness.
- Assess third-party/vendor intelligence services to ensure effectiveness and SLA adherence.
Requirements
- Minimum 8 years of experience in cybersecurity operations, with at least 3+ years focused on Threat Intelligence and/or Threat Hunting.
- Strong working knowledge of the MITRE ATT&CK framework and adversary emulation methodologies.
- Experience analysing malware campaigns, ransomware activity, or nation-state threat actors is highly preferred.
- Familiarity with SIEM, EDR, threat intelligence platforms, and log analytics tools.
- Experience within financial services or regulated industries is advantageous.
- Strong analytical thinking, structured reporting, and stakeholder communication skills.
- GCTI, GCIH, GCIA, CISSP, or equivalent advanced cybersecurity certifications preferred.
Morgan Mckinley Pte Ltd
EA Licence No: 11C5502
EAP Registration No: R1106192
