Logo
Verizon Communications

Principal Insider Threat Analyst

Verizon Communications, Irving, Texas, United States, 75084

Save Job

Apply prior to the end date: October 16th, 2025 Overview

Verizon is looking for an innovative and driven leader with insider threat security operations experience. This role supports a 24x7x365 geographically dispersed team that detects, analyzes, and responds to suspicious activities and potential insider threats. You will mature and enhance existing insider threat defense capabilities by collaborating on efforts to design and implement improved processes and technologies within Verizon's security landscape, and work with cross-functional stakeholders to develop a program for proactive and mitigating measures to detect and respond to threats to Verizons infrastructure, employees, and intellectual property. This role is part of Verizon Cyber Defenses Insider Threat Operations (ITO) team under Verizon CyberSecurity (VCS). The ITO mission is to protect Verizon by preventing, detecting, and investigating insider threats from malicious or negligent employees, contractors and vendors with minimal disruption to the line of business. Primary responsibilities

Support day-to-day operations for insider threat investigations, ensuring case management and alert development life cycles are followed or adjusted when necessary. Conduct continuous enterprise-wide insider threat monitoring by reviewing end user activity and identifying threats from SEIM dashboards and tool consoles; respond to automated alerts and perform in-depth analysis to detect potential insider threats. Ensure accurate and complete investigations, perform case follow-up, capture lessons learned, develop case studies, and socialize findings with appropriate stakeholders. Review and provide feedback to analysts on case work and escalations. Develop and maintain documentation that visually depicts insider threat operations workflows to support an innovative program and strengthen security practices. Produce metrics and status updates of operational tasks, plus high-level case overviews and executive summaries for technical and non-technical audiences. Assist with development and implementation of global insider threat use cases related to data exfiltration, internal fraud, privilege escalations, and IT sabotage across desktops, laptops, servers, mobile, virtual, and multi-cloud environments. Research industry trends and best practices to ensure alerting and case management evolve with the cybersecurity field. Coordinate and lead meetings with investigative stakeholders and business partners as needed. Collaborate to grow and mature ITOs monitoring capabilities of critical data and high-valued assets. Support team goals and prioritize/executing tasks to achieve organizational objectives. Promote collaboration and accountability in problem-solving, decision-making, and process improvement. Support team growth, development, and employee mentorship. Youll need to have

Bachelors degree or four or more years of work experience. Six or more years of relevant experience required, demonstrated through work and/or military experience, or specialized training. Experience implementing cybersecurity, network defense, and investigative frameworks (e.g., NIST CSF, ISO 27000 series, MITRE ATT&CK, Lockheed Martin Cyber Kill Chain) into network defense processes. Even better if you have one or more of the following

Knowledge of SOC or similar environment methodology, including threat monitoring, intrusion detection, analysis, threat determination, incident handling, and remediation tracking. Experience defending against insider threats using UEBA and DLP. Experience interpreting data from network security tools and infrastructure technologies (SIEM, firewalls, proxies, IPS/IDS, FPC, email platforms). Knowledge of the cyber threat landscape, including adversaries, campaigns, and motivations. Experience in analysis techniques, indicators of compromise, threat hunting, and intrusion/incident identification. Experience integrating subject profiling and criminal examination practices into investigative procedures to supplement technical evidence. Understanding of system development life cycle (waterfall & agile). Certifications such as ITPM, Network+, Security+, CISSP, CISM, CFE, CISA, CPCI, CCP, Six Sigma Green Belt or Lean certification. If Verizon and this role sound like a fit for you, we encourage you to apply even if you dont meet every even better qualification listed above. Where youll be working

In this hybrid role, youll have a defined work location that includes working from home and a minimum of three days per week in the office, as set by your manager. You must comply with hybrid work policies. Scheduled Weekly Hours

40 Equal Employment Opportunity

Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to veteran status, disability or other legally protected characteristics. Benefits and Compensation

Our benefits help you move forward in your career and life, including medical, dental, vision, disability, life insurance, identity protection, and pet insurance. We offer a matched 401(k), stock incentives, holidays, personal days, parental leave, tuition assistance, and more as part of Verizons total rewards package. Salary varies by location and experience. This is an incentive-based role with the potential to earn more. For part-time roles, compensation is adjusted by hours. The salary range for the listed location(s) on a full-time basis is: $120,500.00 - $231,000.00. Temple Terrace, Florida, and other locations Basking Ridge, New Jersey, and other locations Connect with the best and brightest to help innovate and operate some of the worlds largest platforms and networks. Stay in touch

Even if youre not a Verizon V Teamer yet, you can sign up to stay in the loop and join our network. #J-18808-Ljbffr