
Accenture
Cyber Threat Intelligence Engineer (Security Transformation)
- Permanent
- Jeddah, Saudi Arabia
- Experience 2 - 5 yrs
Job expiry date: 28/01/2026
Job overview
Date posted
14/12/2025
Location
Jeddah, Saudi Arabia
Salary
Undisclosed
Compensation
Comprehensive package
Experience
2 - 5 yrs
Seniority
Experienced
Qualification
Bachelors degree
Expiration date
28/01/2026
Job description
The Cyber Threat Intelligence Engineer role at Accenture Security focuses on monitoring, analyzing, and operationalizing cyber threat intelligence to protect organizations across Saudi Arabia and the GCC. Operating within Accentureās Security Transformation practice, the role involves continuous monitoring of global and regional threat landscapes, with particular emphasis on campaigns targeting KSA and GCC entities. The position requires gathering and curating intelligence from open-source, commercial, and proprietary feeds, conducting OSINT investigations, and producing detailed threat intelligence reports, advisories, and executive briefings for internal stakeholders and clients. The role applies structured analytical techniques and the MITRE ATT&CK framework to assess adversary tactics, techniques, and procedures, and collaborates closely with SOC and Incident Response teams to translate intelligence into detection rules, threat hunting activities, and response playbooks. The role also ensures cyber threat intelligence processes align with regulatory and compliance frameworks such as the SAMA Cybersecurity Framework and NCA Essential Cybersecurity Controls, contributing to resilience and proactive cyber defense within complex enterprise environments.
Required skills
Key responsibilities
- Continuously monitor global and regional cyber threat landscapes including campaigns targeting Saudi Arabia and the GCC
- Collect, curate, and analyze threat intelligence from open-source, commercial, and proprietary data feeds
- Conduct OSINT investigations to identify emerging threats, threat actors, and attack campaigns
- Produce detailed threat intelligence reports, advisories, and executive-level briefings
- Define intelligence requirements and perform threat modeling using structured analytical techniques
- Analyze adversary tactics, techniques, and procedures using the MITRE ATT&CK framework
- Collaborate with SOC and Incident Response teams to operationalize intelligence into detection rules and threat hunting activities
- Support the development of response playbooks based on actionable intelligence
- Ensure cyber threat intelligence processes align with SAMA Cybersecurity Framework and NCA ECC controls
Experience & skills
- Hold a bachelorās degree in Computer Science, Cybersecurity, or a related discipline
- Demonstrate 2ā4 years of experience in Cyber Threat Intelligence, SOC operations, DFIR, or threat hunting
- Possess strong knowledge of threat actor groups, malware families, and attack campaigns relevant to the Middle East
- Have hands-on experience with CTI tools and platforms such as MISP, ThreatConnect, or Recorded Future
- Demonstrate familiarity with the MITRE ATT&CK framework and structured analytic techniques
- Hold or pursue relevant certifications such as GIAC GCTI or CompTIA CySA+