Cybersecurity Threat Intelligence Engineer II

Premera Blue CrossMountlake Terrace, WA
Hybrid

About The Position

The Cybersecurity Threat Intelligence Engineer II is a member of Premera’s Threat Intelligence, reporting to the Manager of threat Intelligence. This Engineer is responsible for responding to cyber security incidents, using critical thinking skills and forensic analysis to ensure that cyber security threats are proactively stopped from the Premera network. These threats include actors from Nation State, Cyber-criminal organizations, and Insider Threats. This position is instrumental in the overall Security Awareness Program where written communication and public speaking to all employees is common. This is a hybrid role, located on our campus in Mountlake Terrace, Washington.

Requirements

  • Your dedication to the focus on preventing Cyber threats.
  • Your passion for hunting and investigating Cyber threats.
  • Your understanding that Cyber threats don’t happen between normal business hours.
  • Your natural curiosity around threat analysis and investigation.
  • Bachelor’s degree in Information Systems or Business Administration or four (4) years’ experience. (Required)
  • Three (3) years’ experience designing, implementing, and troubleshooting networked computer systems, including: systems integration, hardware requirements and network design planning; vendor negotiations for hardware and software; which must include: Two (2) years’ experience with secure network and systems architecture, design and implementation, intrusion detection, defense and incident response, security configuration management, access controls design and implementation and security policy and standards development. (Required)

Nice To Haves

  • Demonstrated understanding of health plan operations and applicable security & privacy legislation. (Preferred)
  • Knowledge of business continuity planning practices. (Preferred)
  • Knowledge of applicable practices and laws relating to data privacy and protection. (Preferred)
  • In-depth knowledge of the following technologies and protocols: ARP, TCP/UDP, IP, NetBIOS, Radius, 802.1x, Bind/DNS and Active Directory, LDAP, SMTP, DHCP, SSH, SFTP, FTP, TFTP, SNMP, SSL/HTTPS, NTP, Sun, Syslog, VoIP, QoS, VLANs; Wireless protocols: 802.11 specs, WPA/2, WEP, TTLS, PEAP; Routing protocols: RIP/2, OSPF, EIGRP, Frame-relay, and MPLS. Database systems: SQL Server, Oracle, and MySQL. (Preferred)
  • Demonstrated understanding of Operating System architecture as it relates to the functions of the following components: OS kernel, OS kernel modules and device drivers, memory management, inter-process communication, security subsystem, user account rights, user group rights, system logs, I/O functions, network services, file-system permissions, and application interaction with the Operating System. (Preferred)

Responsibilities

  • Applies advanced understanding HITURST engineering and controls standards.
  • Performs risk and severity assessment on cybersecurity events and incidents and then properly escalate or handle in accordance with experience and current processes.
  • Act as a technical contributor with advanced knowledge and experience in one or more areas: PICERL (Planning, Investigation, Containment, Eradication, Lessons Learned) process HR related Investigative and Legal Processes Conflict resolution and Clear Partnership Analyzing gaps found in hunting exercises and minimizing the overall threat landscape
  • Set the tempo, priorities, and proper workflow of the team in the day-to-day operations.
  • Reviews and report out to the team IT security threat assessments for major changes to systems, applications, and networks. This requires applying knowledge of vulnerability assessment and penetration testing tools.
  • Maintains current expertise in security hacks and network penetration methods.
  • Defines and documents defensive tactics.
  • Defines and oversees implementation plans for security configuration changes.
  • Provides advanced technical analysis and evidence capture as Level 3 technical support for security incident response.
  • Defines IT policies, standards, and procedures to assure technical compliance with enterprise security policies and promote consistent use of best practices in information security. This includes regulatory standards such as SOX, HIPAA, PCI, GLBA, and various state and federal privacy laws.
  • Mentor and guide junior Information Security Engineers in day-to-day operations and tasks.
  • Exhibit skills of leadership and be able to perform duties with little or no supervision.
  • Perform other duties as assigned.

Benefits

  • Medical, vision, and dental coverage with low employee premiums.
  • Voluntary benefit offerings, including pet insurance for paw parents.
  • Life and disability insurance.
  • Retirement programs, including a 401K employer match and, believe it or not, a pension plan that is vested after 3 years of service.
  • Wellness incentives with a wide range of mental well-being resources for you and your dependents, including counseling services, stress management programs, and mindfulness programs, just to name a few.
  • Generous paid time off to reenergize.
  • Tuition assistance for both undergraduate and graduate degrees.
  • Employee recognition program to celebrate anniversaries, team accomplishments, and more.
  • Commuter perks make your trip to work less impactful on the environment and your wallet.
  • Free convenient on-site parking.
  • Subsidized on-campus cafes make lunchtime connections with colleagues fun and affordable.
  • Participate in engaging on-site activities such as health and wellness events, coffee connects, disaster preparedness fairs and more.
  • Our complementary fitness & well-being center offers both in-person and virtual workouts and nutritional counseling.
  • Challenge someone to a game of shuffleboard or ping pong while on campus.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service