Job Responsibilities include but not limited to:
- Conduct triage of cyber security alerts to identify anomalous activities of concern related to insider threat behavior.
- Identify and prevent potential insider threats including, but not limited to, obfuscation and exfiltration of data.
- Initiate and monitor incident workflows to completion, including properly escalating cases requiring investigation.
- Continually modify and refine analytical approaches and make specific tuning recommendations.
- Review data, perform trend analysis, generate reports, and present to management in an easy to understand format.
Required Education, Experience, & Skills
Required Skills:
- One+ year experience in cyber or intelligence analysis
- Familiarity with Arcsight, Splunk, Netwitness, Crowdstrike, and Archer
- Familiarity with JIRA and Confluence
- Familiarity with data loss prevention and triage methodology
- Familiarity with investigative procedures and case writing
- Experience reading, analyzing, and interpreting complex documents
- Excellent communication skills, including demonstrated proficiency in clearly communicating technical concepts to non-technical audiences
- Must be proactive and have the ability to work independently/efficiently and to thrive in a fast paced environment, as well as the ability to work collaboratively with cross-functional and remote teams
- Must be able to operate under tight deadlines
- Must be able to learn quickly and apply new tools and techniques
- Attention to detail and accuracy
Preferred Education, Experience, & Skills
Preferred Skills and Education:
- Insider Threat operations or military counter-intelligence or counter-espionage experience preferred
- Bachelor of Science or equivalent experience preferred
Powered by JazzHR