The Threat Intelligence Analyst will support Moniepoint's security operations by monitoring, analyzing, and reporting on emerging cyber threats targeting the financial sector. This role is ideal for early-career cybersecurity professionals looking to build hands-on experience in threat intelligence, OSINT, and adversary analysis within a fast-paced fintech environment.
The analyst will work closely with SOC, Fraud Operations, Product Security and other relevant stakeholders to translate threat data into actionable intelligence.
Key Responsibilities
Threat Monitoring & Collection
Monitor open-source, dark web, and underground forums for threats relevant to Moniepoint and the financial sector
Track ransomware groups, stealer malware, phishing campaigns, brand impersonation, and fraud-related threats
Collect Indicators of Compromise (IOCs) including domains, IPs, URLs, hashes, and malicious infrastructure
Analysis & Intelligence Production
Perform basic triage and analysis of threat data to determine relevance and risk
Assist in identifying adversary tactics, techniques, and procedures (TTPs)
Support mapping of threats to MITRE ATT&CK where applicable
Contribute to daily, weekly, and ad-hoc threat intelligence reports
Stakeholder Support
Share relevant intelligence with relevant stakeholders
Assist in validating alerts and external threat reports
Support investigations related to phishing, account takeover, and third-party risks
Documentation & Continuous Improvement
Maintain threat logs, actor profiles, and intelligence repositories
Document analytical findings clearly and concisely
Learn and apply CTI frameworks, tools, and best practices
Support Incident Response & Vulnerability Management Units
Assist in Incident Response tasks and post-incident analysis when needed.
Assist in Threat Intelligence tasks from internal and external sources when needed.
Conduct regular vulnerability scans and assessments on networks, systems, and applications.
Analyze scan results to identify vulnerabilities, potential risks and ensure timely remediation.
Required Qualifications
Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or related field
Good understanding of cybersecurity concepts (malware, phishing, ransomware, fraud)
Familiarity with OSINT concepts and publicly available intelligence sources
Strong analytical and critical-thinking skills
Good written communication skills with attention to detail
Preferred / Nice-to-Have
3 - 5 years of Experience in SOC, IR or Threat Intelligence
Familiarity with MITRE ATT&CK, Pyramid of Pain, or Diamond Model
Good knowledge of SIEM, EDR, Threat Intelligence Tools, OSINT Tools.
Exposure to fintech or financial-sector threats is a good advantage.
Certifications such as Security+,EC-Council CTIA