The Information Security Analyst III, Threat Intelligence & Insider Threat supports the organization’s cyber threat intelligence and insider threat programs, transforming cybersecurity from a reactive function into a strategic business enabler. This skilled cybersecurity role proactively identifies, analyzes, and disseminates actionable intelligence from emerging cyber threats and insider risks. Develop and refine threat detection capabilities across tools and processes. The position serves as a bridge between technical teams, business units and management, collaborating as part of a cross-functional teams to ensure that threat insights are integrated into security operations, risk management, and executive decision-making, supporting business resilience, regulatory compliance, and enterprise-wide risk mitigation. Performs daily operations and monitor events from multiple sources including, but not limited to, SIEM consoles, network and host based intrusion detection systems, firewall consoles, system logs (Unix and Windows), applications, databases, and other security information monitoring tools. Participates in knowledge sharing with other analysts and writing technical articles for internal Knowledgebase. Creates and maintains documentation for procedures and process improvement. Interfaces with users to understand their security needs and implements procedures that support security and business initiatives. Ensures users understand and adhere to necessary procedures to maintain security. Conducts accurate evaluation of the level of security required when requests are made by other teammembers and ensures that appropriate security measures are in effect to maintain an appropriate level of security confidentiality, availability and integrity. Weighs business needs against security concerns, finds the right solution to support the business and articulates any issues to management. Assists in the development, implementation and periodic review of security policies, procedures and metrics to ensure we are applying industry best practices and standards. Performs security assessments and reviews local area networking initiatives for security compliance. Ensures system resource configurations, software, applications and processes or guidelines comply with Information Security requirements, policies and standards. Assists in the planning, organizing and implementation of Information Security related projects.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level