Ongoing Cyber Threat Intelligence Monitoring

Замовник: AI | Опубліковано: 29.10.2025

I’m looking for a security specialist who can continuously scan the open-source intelligence ecosystem and the dark web for emerging cyber threats that may target my organisation. The work involves identifying threat actors, chatter, leaked exploits, and early indicators of compromise, then translating that raw data into actionable intelligence. Scope of work • Map out relevant dark-web markets, forums, Telegram channels, and paste sites. • Configure and maintain OSINT tooling (e.g., Maltego, Shodan, SpiderFoot, or your preferred stack) to harvest data automatically. • Correlate findings with MITRE ATT&CK techniques and known CVEs to prioritise risks. • Deliver concise weekly summaries and urgent real-time alerts when critical items surface. • Provide a monthly consolidation report highlighting patterns, recommended mitigations, and any exposed assets. I’m flexible on timeline, so you can build a solid, sustainable monitoring workflow rather than rush a one-off sweep. When you apply, focus on your experience running similar threat-intelligence or dark-web monitoring programmes. Links to previous dashboards, redacted sample reports, or a brief overview of notable incidents you helped detect will help me gauge fit quickly. Let’s turn scattered underground chatter into clear, timely intelligence my team can act on.