About The Position

The Lead Cyber Intelligence Analyst on the Security Operations Center (SOC) team fulfills a critical cyber security role in protecting the UPS Enterprise against cyber threats and supports operational readiness. The SOC Lead analyst is the Subject Matter Expert (SME) on the monitoring of security events to protect UPS Enterprise and information systems. Responsibilities include providing guidance and training to SOC analysts, and reporting to Management and Senior InfoSec Leaders about current incident handling and incident response efforts. They also include: directing multiple incident-based activities and tasks, actively participating in a broad range of complex technical and professional functions to identify, investigate, analyze, contain and remediate information security events and incidents, and providing recommendations on cyber security defensive posture configurations to Senior InfoSec Leadership. The Lead Cyber Intelligence Analyst influences and provides technical expertise in a broad range of complex technical and professional functions related to Security Operations. He/She applies data science principles to security events and incidents to identify gaps to facilitate the creation of new and advanced methods of detection. This position leverages Security Operations Control (SOC) analytical findings to create actionable threat intelligence to influence changes to the information security posture. The Lead Cyber Intelligence Analyst is the Subject Matter Expert on the monitoring of security events to protect enterprise and information assets. He/She directs multiple incident-based activities and tasks, guides and influences the department and project teams, and trains colleagues to improve their skillsets and knowledge. This position works with upper management to recommend and implement changes to the Intelligence and Incident Response program.

Requirements

  • 3+ years as an analyst, preferably from a Security Operation Center (SOC), including Incident Response and Handling roles.
  • Lead incident response efforts, especially when high-level cyber threats or incidents are identified.
  • Experience with cybersecurity tools (e.g., SIEM/SOAR platforms, threat intelligence platforms, endpoint detection tools).
  • Hands-on experience with incident response and understanding of attack vectors and common cybersecurity vulnerabilities.
  • Experience with multi-cloud technologies such as Google Cloud, Azure and AWS
  • Expert understanding of network protocols, TCP/IP fundamentals, operating systems along with log, network and system security analysis techniques.
  • Clear and concise communication and presentation of complex and complicated security topics
  • Expert knowledge of security exploitation trends and methodologies to identify anomalous patterns.
  • Proven experience leading a team of highly specialized professionals to accomplish difficult tasks.
  • Proven ability to present highly technical information to Decision Makers and Stakeholders
  • Bachelor’s Degree Required
  • Multiple GIAC Required
  • Must be a U.S. Citizen or National of the U.S., an alien lawfully admitted for permanent residence, or an alien authorized to work in the U.S. for this employer.

Nice To Haves

  • Master’s Degree Preferred

Responsibilities

  • Providing guidance and training to SOC analysts
  • Reporting to Management and Senior InfoSec Leaders about current incident handling and incident response efforts
  • Directing multiple incident-based activities and tasks
  • Actively participating in a broad range of complex technical and professional functions to identify, investigate, analyze, contain and remediate information security events and incidents
  • Providing recommendations on cyber security defensive posture configurations to Senior InfoSec Leadership
  • Applying data science principles to security events and incidents to identify gaps to facilitate the creation of new and advanced methods of detection
  • Leveraging Security Operations Control (SOC) analytical findings to create actionable threat intelligence to influence changes to the information security posture
  • Directs multiple incident-based activities and tasks
  • Guides and influences the department and project teams
  • Trains colleagues to improve their skillsets and knowledge
  • Works with upper management to recommend and implement changes to the Intelligence and Incident Response program

Benefits

  • Medical/prescription drug coverage
  • Dental coverage
  • Vision coverage
  • Flexible Spending Account
  • Health Savings Account
  • Dependent Care Flexible Spending Account
  • Basic and Supplemental Life Insurance & Accidental Death and Dismemberment
  • Disability Income Protection Plan
  • Employee Assistance Program
  • 401(k) retirement program
  • Vacation
  • Paid Holidays and Personal time
  • Paid Sick and Family and Medical Leave time as required by law
  • Discounted Employee Stock Purchase Program
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service