Analyst, Cyber Threat

Lifepoint HealthBrentwood, TN
Hybrid

About The Position

The Cybersecurity Threat Analyst is an entry-level role responsible for monitoring, analyzing, and triaging security events across the healthcare enterprise. This role supports day-to-day cyber defense operations, assists with incident detection and response, and contributes to exposure identification and reduction efforts. The Analyst will develop foundational cybersecurity skills and serve as the first line of defense.

Requirements

  • Associates or Bachelors in Cybersecurity, Information Technology, Computer Science, or equivalent experience.
  • 0–2 years in security operations, incident response, cybersecurity/IT roles (help desk, SOC Tier 1) or related technical roles (internships included).
  • Curiosity and willingness to learn new technologies, including AI-enabled security capabilities.
  • Foundational understanding of core security concepts (malware, phishing, lateral movement, vulnerabilities, lateral movement and identity misuse).
  • Basic understanding of networking, compliance frameworks, and common attack vectors.
  • Familiarity with SIEM/centralized logging, EDR, email security, phishing defense, and vulnerability management.
  • Comfortable using automation/AI tools within policy constraints; strong attention to detail and documentation.
  • Analytical and critical thinking skills.
  • Moderate computer skills to include use of email, word processing, data entry, and spreadsheets.
  • Strong written and verbal communication skills.
  • Ability to solve cybersecurity problems following documented procedures.
  • Ability to organize and manage multiple tasks simultaneously.
  • Ability to follow defined processes and escalation paths.

Nice To Haves

  • ISC2 CC
  • GIAC GFACT
  • GIAC GSEC
  • CompTIA Security+
  • CompTIA CySA+
  • or similar

Responsibilities

  • Perform Tier 1-level (initial) ticket queue intake, triage, investigation, remediation and document corrective actions in corporate ticketing systems.
  • Monitor security alerts, events, and dashboards to identify potential threats, policy violations, or anomalous behavior.
  • Triage detections from endpoint or identity-related alerts, email security, phishing reports, vulnerability, and logging platforms.
  • Conduct basic threat hunting and gather artifacts (hashes, URLs, process trees, etc.) for senior reviewers.
  • Assist with investigation and documentation of security events following established playbooks and procedures.
  • Develop and execute playbooks for investigative, response, and containment actions with appropriate escalation based on severity.
  • Leverage AI‑assisted investigation, summarization, correlation, and data enrichment, verifying content for accuracy.
  • Stay informed on emerging threats, healthcare-specific attack trends, and adversary use of automation and AI.
  • Assist in maintaining security tool health.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service