Jobs via Dice
Dice is the leading career destination for tech experts at every stage of their careers. Our client, cyberThink, Inc., is seeking a highly experienced Senior Insider Threat Analyst to lead the implementation of a new insider threat detection tool and build a robust insider threat operations program from the ground up. This role is critical to enhancing our organization’s ability to identify, assess, and mitigate insider risks, including data loss, intellectual property theft, and malicious activities.
The role offers a hybrid/flexible schedule: an in‑office expectation of three or more days per week with the flexibility to work outside the office location for the other days.
Responsibilities
Design and mature a comprehensive insider threat program aligned with organizational goals and regulatory requirements.
Develop policies, processes, and workflows for detecting, investigating, and mitigating insider threats.
Define metrics and reporting frameworks to measure the effectiveness of the program.
Lead the configuration and tuning of a new insider threat detection tool and ensure seamless integration with existing security systems such as SIEM and SOAR.
Collaborate with vendors and IT teams to customize the tool for organization‑specific use cases.
Monitor user and entity behavior analytics to identify suspicious activities and policy violations.
Conduct in‑depth investigations into insider threat incidents, working closely with cybersecurity, HR, and legal teams.
Refine detection capabilities by creating and optimizing rules, alerts, and risk scoring models.
Act as a subject matter expert on insider threat risks and tools.
Train and mentor junior analysts and cross‑functional stakeholders on insider threat detection techniques and tool usage.
Support the investigation and resolution of insider threat incidents, ensuring thorough documentation and root‑cause analysis.
Develop and execute response playbooks for various insider threat scenarios.
Required Qualifications
Bachelor’s degree in cybersecurity, information technology, or a related field; advanced degree preferred.
7+ years of experience in cybersecurity, focusing on insider threat analysis and program development.
Strong understanding of UEBA tools, digital forensics, and data loss prevention (DLP) strategies.
Proven expertise in deploying and managing insider threat tools, specifically with DTex InTERCEPT.
Experience developing policies, procedures, and workflows for insider threat management.
Familiarity with SIEM platforms, data analytics tools, and insider threat indicators and detection methods.
Experience with scripting and automation (e.g., BigQuery, Python, PowerShell) is a plus.
Preferred Qualifications
Bachelor’s degree in computer science or related field.
Relevant certifications such as CISSP, CISM, CISA, GIAC, or insider threat‑specific credentials (e.g., Certified Insider Threat Program Manager).
Knowledge of legal and regulatory requirements surrounding insider threat and data protection (e.g., GDPR, CCPA).
Key Competencies
Strong analytical and critical thinking skills.
Strategic mindset with the ability to design and operationalize new programs.
Detail‑oriented, self‑driven, and capable of working independently in a fast‑paced environment.
Competent in collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources, documenting results, and analyzing findings to provide viable threat intelligence.
#J-18808-Ljbffr
The role offers a hybrid/flexible schedule: an in‑office expectation of three or more days per week with the flexibility to work outside the office location for the other days.
Responsibilities
Design and mature a comprehensive insider threat program aligned with organizational goals and regulatory requirements.
Develop policies, processes, and workflows for detecting, investigating, and mitigating insider threats.
Define metrics and reporting frameworks to measure the effectiveness of the program.
Lead the configuration and tuning of a new insider threat detection tool and ensure seamless integration with existing security systems such as SIEM and SOAR.
Collaborate with vendors and IT teams to customize the tool for organization‑specific use cases.
Monitor user and entity behavior analytics to identify suspicious activities and policy violations.
Conduct in‑depth investigations into insider threat incidents, working closely with cybersecurity, HR, and legal teams.
Refine detection capabilities by creating and optimizing rules, alerts, and risk scoring models.
Act as a subject matter expert on insider threat risks and tools.
Train and mentor junior analysts and cross‑functional stakeholders on insider threat detection techniques and tool usage.
Support the investigation and resolution of insider threat incidents, ensuring thorough documentation and root‑cause analysis.
Develop and execute response playbooks for various insider threat scenarios.
Required Qualifications
Bachelor’s degree in cybersecurity, information technology, or a related field; advanced degree preferred.
7+ years of experience in cybersecurity, focusing on insider threat analysis and program development.
Strong understanding of UEBA tools, digital forensics, and data loss prevention (DLP) strategies.
Proven expertise in deploying and managing insider threat tools, specifically with DTex InTERCEPT.
Experience developing policies, procedures, and workflows for insider threat management.
Familiarity with SIEM platforms, data analytics tools, and insider threat indicators and detection methods.
Experience with scripting and automation (e.g., BigQuery, Python, PowerShell) is a plus.
Preferred Qualifications
Bachelor’s degree in computer science or related field.
Relevant certifications such as CISSP, CISM, CISA, GIAC, or insider threat‑specific credentials (e.g., Certified Insider Threat Program Manager).
Knowledge of legal and regulatory requirements surrounding insider threat and data protection (e.g., GDPR, CCPA).
Key Competencies
Strong analytical and critical thinking skills.
Strategic mindset with the ability to design and operationalize new programs.
Detail‑oriented, self‑driven, and capable of working independently in a fast‑paced environment.
Competent in collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources, documenting results, and analyzing findings to provide viable threat intelligence.
#J-18808-Ljbffr