Ethnos Cyber Limited, As the preferred cybersecurity solutions provider in Africa, the success of Ethnos Cyber hinges, to a huge extent, on the dedication and quality of our employees. We have an array of varied, flexible, challenging, and rewarding career choices. We are committed to maintaining a stimulating workplace where all employees develop their tale...
Read more about this company
As a Cybersecurity Research Analyst, you will be responsible for conducting in-depth research into emerging cyber threats, vulnerabilities, and attack techniques. You will analyze security trends and provide actionable insights to help safeguard Ethnos Cyber Ltd. and its clients.
This is an opportunity to work in a dynamic environment where your research will directly influence the design of robust security solutions.
Responsibilities
Research and analyze emerging cyber threats, vulnerabilities, malware, and attack techniques.
Monitor cyber threat intelligence sources and provide timely updates on potential risks.
Conduct vulnerability assessments and collaborate with the technical team to mitigate security risks.
Develop technical reports, threat intelligence briefs, and whitepapers to communicate findings.
Support the development of security strategies and policies based on research outcomes.
Stay updated on the latest security tools, frameworks, and trends in the cybersecurity landscape.
Collaborate with internal teams and clients to provide security insights that enhance protection measures.
Participate in security conferences, webinars, and other professional development opportunities to maintain cutting-edge knowledge.
Qualifications
Bachelor’s Degree in Computer Science, Information Security, or a related field.
2+ years of experience in cybersecurity research, threat intelligence, or vulnerability analysis.
Strong understanding of cybersecurity principles, threat analysis, and security technologies.
Proficiency with security research tools (Wire shark, Nessus, Metasploit, etc.).
Excellent analytical, research, and problem-solving skills.
Ability to create detailed technical reports and communicate complex findings to both technical and non-technical stakeholders.
Knowledge of threat intelligence frameworks such as MITRE ATT&CK, CVE, and OWASP.
Relevant certifications (e.g., GCIH, OSCP, CEH, CISSP) is a plus.