Key Interactions: Works under the guidance of senior analysts and team lead. Collaborate with SOC analysts, junior incident response staff, and other cybersecurity teams.Required Education: Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field.Key Responsibilities:Monitor and triage threat intelligence alerts from various internal and external sources. Investigate security alerts to identify false positives and provide initial validation. Work with the team to track, record, and resolve false positives to improve alert quality. Assist in the creation and documentation of daily, weekly, and monthly threat intelligence reports. Assist in the creation and distribution of intelligence reports. Analyze and correlate information to identify patterns and emerging threats. Provide support to senior analysts in investigating specific incidents or trends. Participate in ongoing training to develop advanced threat intelligence skills.Qualifications:Work well as part of a collaborative teamGood written and verbal communication skillsProficiency in English, with excellent report-writing skillsResearch oriented mindset with strong attention to detailsTechnical Skills:Knowledge of network basics and network security principlesKnowledge in threat analysis, intelligence gathering, and risk assessment.Knowledge in vulnerability frameworks (CVE, CWE), and scoring systems like CVSS.Experience working with threat frameworks such as MITRE ATT&CK, Diamond Model, and Cyber Kill Chain.Familiarity with threat intelligence tools such as OpenCTI, MISP, ThreatQ or similar platforms is a plus