About The Position

The Lead Cyber Intelligence Analyst plays a pivotal role in defending enterprise systems against advanced cyber threats while supporting operational readiness and incident response. This position serves as a Subject Matter Expert (SME) in monitoring security events, analyzing threats, and guiding Security Operations Center (SOC) teams. You will lead incident response efforts, provide actionable threat intelligence, and influence improvements to cybersecurity posture. The role combines technical expertise, leadership, and strategic oversight, ensuring complex cyber incidents are contained, remediated, and communicated effectively to senior stakeholders. You will mentor analysts, implement best practices, and leverage data-driven insights and multi-cloud technologies to enhance detection and defense capabilities. This is a fully remote role requiring strong collaboration, analytical precision, and a proactive approach to cybersecurity leadership.

Requirements

  • Bachelor’s degree required; Master’s degree preferred in Cybersecurity, Information Technology, or related field.
  • Minimum 3+ years of experience as a cybersecurity analyst, ideally within a SOC, including incident response and handling roles.
  • Proven experience leading a team of cybersecurity professionals in high-stakes environments.
  • Expertise with cybersecurity tools (SIEM/SOAR platforms, threat intelligence platforms, endpoint detection tools).
  • Strong knowledge of network protocols, TCP/IP, operating systems, and security analysis techniques.
  • Hands-on experience with multi-cloud technologies such as AWS, Azure, and Google Cloud.
  • Multiple GIAC certifications required; additional relevant certifications a plus.
  • Exceptional analytical, communication, and presentation skills with the ability to convey complex concepts to executives.
  • Deep understanding of threat exploitation trends and ability to identify anomalous patterns effectively.

Responsibilities

  • Lead and direct incident response activities for high-level cyber threats, coordinating SOC analysts and cross-functional teams.
  • Analyze, investigate, and remediate information security events, applying data science principles to identify gaps and vulnerabilities.
  • Provide technical guidance and training to SOC staff to elevate team skillsets and operational readiness.
  • Develop actionable threat intelligence from security operations findings to influence improvements to enterprise security posture.
  • Collaborate with senior management to recommend and implement changes to intelligence and incident response programs.
  • Maintain and optimize monitoring, detection, and response processes across multi-cloud environments and enterprise systems.
  • Present complex technical information clearly to stakeholders and decision-makers to support informed security decisions.

Benefits

  • Competitive base salary range of $106,560 to $197,460 per year, with potential short-term and long-term incentives.
  • Comprehensive healthcare, including medical, dental, vision, and prescription coverage.
  • Flexible spending accounts, health savings accounts, and dependent care coverage.
  • Life insurance, disability income protection, and accidental death and dismemberment coverage.
  • 401(k) retirement plan with employer contributions.
  • Paid vacation, holidays, personal time, sick leave, and family/medical leave as required by law.
  • Employee assistance programs, stock purchase programs, and professional development opportunities.
  • Fully remote work option with flexibility to manage your schedule.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service