Cyber Insider Threat Analyst III

Agile DefenseSpringfield, VA
Hybrid

About The Position

This role conducts ongoing cyber insider threat monitoring to identify threats associated with authorized users conducting unauthorized activities such as data exfiltration, unauthorized access, and/or other negligent or malicious behaviors. One must be a SME in User Activity Monitoring (UAM) and/or User Behavior Analytics (UBA). Engages advanced operations, legal, HR, or law enforcement teams to coordinate and report on investigations. Engages with cyber program elements including Cyber Threat Intelligence, Cyber Hunt Forensics, Malware Reverse Engineering, Threat Emulation, and Security Operations to coordinate and consult on insider threat investigations. Create incident reports detailing cyber methods of identification, analysis, and conclusion.

Requirements

  • Bachelor’s degree in computer science, Engineering, STEM, Information Technology, or Cybersecurity certificates are advantageous.
  • 5 years experience minimum in UAM/UBA analysis.
  • Minimum of five (5) years of professional experience leading the cyber component of an insider threat program, with an in-depth understanding of the principles, methodologies, and best practices for establishing, operating, and maturing an insider threat program (UAM or UBA).
  • Top Secret / SCI Clearance

Nice To Haves

  • Counter-intelligence experience
  • Digital Forensics and related certifications
  • User Activity Monitoring (UAM)
  • User Behavior Analytics (UBA)
  • DCSA Insider Threat Hub certifications

Responsibilities

  • Conduct ongoing cyber insider threat monitoring to identify threats associated with authorized users conducting unauthorized activities such as data exfiltration, unauthorized access, and/or other negligent or malicious behaviors.
  • Engage advanced operations, legal, HR, or law enforcement teams to coordinate and report on investigations.
  • Engage with cyber program elements including Cyber Threat Intelligence, Cyber Hunt Forensics, Malware Reverse Engineering, Threat Emulation, and Security Operations to coordinate and consult on insider threat investigations.
  • Create incident reports detailing cyber methods of identification, analysis, and conclusion.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service