
Deloitte Innovation Hub I Cyber Security I Threat Intelligence Senior Engineer, Cairo, Egypt
- Cairo
- Permanent
- Full-time
- Develop tailored intelligence operating models for clients, covering governance structures, operational processes, data management practices, intelligence requirements, reporting standards, benchmarking, and continuous improvement initiatives.
- Produce high-quality deliverables and reports in excellent English, backed by thorough research and comparative analysis of global intelligence frameworks.
- Analyze cyber and physical threat actors, including advanced persistent threats, to assess current and emerging threat landscapes and help clients understand potential risks.
- Apply intelligence methodologies and frameworks, such as the intelligence lifecycle, MITRE ATT&CK, the Diamond Model, the Cyber Kill Chain, and analysis of indicators of compromise and tactics, techniques, and procedures.
- Conduct intelligence gathering from open sources, social media platforms, and the deep and dark web to generate actionable insights and predictive assessments.
- Evaluate geopolitical risks and opportunities, preparing analyses that inform clients about the potential impact of global events on their security and business operations.
- Utilize cyber threat intelligence platforms like Anomali, Crowdstrike, and Mandiant, along with OSINT tools such as VirusTotal, DomainTools, and Shodan, to support intelligence analysis and reporting.
- Communicate complex data and threat trends clearly through reports and presentations, ensuring stakeholders of various backgrounds can understand key insights and recommendations.
- Lead small teams of analysts on intelligence projects, fostering collaboration, knowledge sharing, and high-quality delivery in fast-paced, multicultural environments.
- Identify and solve complex security challenges by analyzing diverse data sources, interpreting trends, and translating findings into strategic recommendations for clients.
- Ensure compliance with data protection laws and regulatory requirements related to cyber intelligence operations, particularly within the Middle East region.
- Stay current with emerging developments in cyber threat intelligence, geopolitical events, and evolving security standards to continuously enhance expertise and client offerings.
- 3-5 years of experience in cybersecurity, threat hunting, incident response, intelligence analysis, geopolitical risk, or defense roles.
- Strong knowledge of cyber threat intelligence terminology, data communication concepts, and familiarity with scripting languages or APIs.
- Experience performing OSINT, SOCMINT, and deep and dark web intelligence gathering, and applying intelligence frameworks such as the intelligence lifecycle, MITRE ATT&CK, the Diamond Model, and the Cyber Kill Chain.
- Solid knowledge of cyber threat actors, including advanced persistent threats, and an understanding of both cyber and physical threat landscapes.
- Ability to assess geopolitical risks and forecast the potential impact of global events on security and business operations.
- Proficiency in using cyber threat intelligence tools such as Anomali, Crowdstrike, and Mandiant, and OSINT tools like VirusTotal, DomainTools, and Shodan.
- Strong analytical skills to interpret complex data, identify trends, and develop actionable insights and recommendations.
- Excellent organizational skills and the ability to produce high-quality written and verbal communication, including reports and client presentations.
- Strong problem-solving skills to address complex security and geopolitical challenges.
- Experience leading small teams and collaborating effectively on intelligence projects.
- Ability to adapt quickly and remain calm under pressure in fast-paced environments.
- Experience working effectively in multicultural teams and diverse professional settings
- Understanding of cybersecurity and IT disciplines including networking, operating systems, authentication protocols, security incident response, and enterprise technical security solutions (SIEM, IDS/IPS, firewall solutions, offensive security tools).
- Experience with scripting or programming, including malware reverse engineering.
- Deep knowledge of security frameworks and standards (e.g., NIST, ISO).
- Certifications in relevant areas (e.g., CISSP, CEH).
- Experience with data visualisation tools and techniques.
- Ability to speak multiple languages, especially Arabic.
- Experience conducting cyber threat hunting operations using known adversary tactics, techniques, and procedures to detect advanced threats to the enterprise.
- Experience with country regulations governing cyber intelligence processing and handling of sensitive data, including those in the Middle East.