Threat Intelligence Analyst
Philips
**Title: Threat Intelligence Analyst**
**Location: Bangalore**
**Job Profile Summary:**
The Threat Intelligence Analyst - Enterprise Security - supports the Threat Advisory Group by discovering and analyzing threats to Philips’ products, IP, and enterprise systems. This includes researching threat actors, identifying exposures that could lead to IP theft or product compromise, and communicating mitigation guidance to Business Units (BUs), Enterprise Security and Product Security teams.
This is a technical, investigative, and business-impact–focused role designed for someone early in their career who is eager to learn how adversaries operate and how to counter them.
This role is part of the larger Threat Advisory Group charged with identifying, assessing and mitigating internal and external threats to Philips.
**Key Responsibilities**
+ Identify behaviors, threat actors, and vulnerabilities that could lead to theft of Philips information.
+ Assist in researching cyber threat actors that target healthcare, MedTech, cloud platforms, or manufacturing environments.
+ Identify misconfigurations or exposed interfaces that could enable product manipulation, IP theft, or service disruption.
+ Conduct initial triage of vulnerabilities, suspicious activity, and exposure findings.
+ Work directly with BUs to explain threats, exposures, and potential business impact in plain language.
+ Draft clear threat summaries, early-warning briefs, exposure reports, and product-focused risk assessments.
+ Maintain strong relationships with global security and business partners.
**Required Qualifications**
+ Bachelor’s degree in Engineering, Computer Science, Information Security, or related field.
+ 5 to 10 years’ experience in cybersecurity, software development, product engineering, or IT.
+ Foundational understanding of security concepts (vulnerabilities, networking, cloud).
+ Ability to interpret technical data, conduct research, and communicate clearly.
+ Strong curiosity about how adversaries target systems, steal IP, and disrupt business.
**Preferred**
+ Familiarity with OSINT tools, external scanning, or vulnerability research.
+ Basic understanding of cyber threat actors and their motivations (e.g., IP theft, ransomware, state-sponsored activity).
+ Experience with scripting or automation.
+ Knowledge of intelligence methods, threat actor analysis, and structured analytic techniques.
**Key Competencies**
+ Analytical thinking and curiosity
+ Ability to connect technical findings to business impact
+ Strong writing and communication skills
+ Ethical research discipline
+ Willingness to learn intelligence methods and adversary analysis
+ Collaboration with global engineering and business teams
**How we work together**
We believe that we are better together than apart. For our office-based teams, this means working in-person at least 3 days per week.
Onsite roles require full-time presence in the company’s facilities.
Field roles are most effectively done outside of the company’s main facilities, generally at the customers’ or suppliers’ locations.
Indicate if this role is an office/field/onsite role.
**About Philips**
We are a health technology company. We built our entire company around the belief that every human matters, and we won't stop until everybody everywhere has access to the quality healthcare that we all deserve. Do the work of your life to help the lives of others.
* Learn more about our business.
* Discover our rich and exciting history.
* Learn more about our purpose.
If you’re interested in this role and have many, but not all, of the experiences needed, we encourage you to apply. You may still be the right candidate for this or other opportunities at Philips. Learn more about our culture of impact with care here.
\#LI-PHILIN
Confirmar seu email: Enviar Email
Todos os Empregos de Philips