digiDations is a technology innovator emerging from NTU's research network, revolutionising how organisations validate their cybersecurity. In a world where traditional security assessments fall short against increasingly sophisticated cyber threats, they combine artificial intelligence with real-world threat intelligence to deliver breakthrough security validation solutions.
Their platform does not just find vulnerabilities - it thinks like an attacker, adapts like an attacker, and helps organisations stay ahead of real-world threats. Their vision is a future where organisations can proactively and continuously validate their security defenses, eliminating the gap between security assumptions and reality through data-driven insights.
Project Role: Research and Threat Analysis in Cybersecurity
Participating in cybersecurity research and threat analysis provides an invaluable learning opportunity for trainees interested in advancing their careers in cybersecurity.
Aims of security research and threat analysis:
- Identifying and analysing real-world attack techniques and vulnerabilities.
- Enhancing organisations' security posture through proactive threat research.
- Strengthening security controls and detection capabilities against evolving threats.
- Providing insights into emerging cyber threats, ensuring resilience against adversary tactics.
Key Insights from threat research and analysis:
- Understanding how to track and investigate attack techniques, MITRE ATT&CK mappings, and adversary behaviors by threat groups.
- Assessing the impact of threat intelligence, vulnerabilities, and attack samples (POCs) on customer security environments.
- Identifying security gaps in detection and response capabilities and providing actionable recommendations.
- Gaining familiarity with the tools and methodologies used in threat intelligence gathering and security validation.
Responsibilities
The trainee's responsibilities include but are not limited to the following:
- Researching and analysing threat intelligence sources to understand attack incidents, techniques, vulnerabilities, and exploits.
- Tracking and investigating new attack techniques and adversary behaviors to provide security insights.
- Supporting customers in assessing security gaps and improving detection rules within their security environments.
- Conducting security content validation and improvement discussions with security product vendors when needed.
- Collaborating with security engineers and product teams to enhance security validation methodologies.
- Developing technical reports, research papers, and security updates to contribute to cybersecurity knowledge.

Research and Threat Analysis in Cybersecurity