Principal Lead Analyst, Detection & Response Team (DART)

Corebridge FinancialHouston, TX
Hybrid

About The Position

At Corebridge Financial, we believe action is everything. That’s why every day we partner with financial professionals and institutions to make it possible for more people to take action in their financial lives, for today and tomorrow. We align to a set of Values that are the core pillars that define our culture and help bring our brand purpose to life: We are stronger as one: We collaborate across the enterprise, scale what works and act decisively for our customers and partners. We deliver on commitments: We are accountable, empower each other and go above and beyond for our stakeholders. We learn, improve and innovate: We get better each day by challenging the status quo and equipping ourselves for the future. We are inclusive: We embrace different perspectives, enabling our colleagues to make an impact and bring their whole selves to work. The Information Technology organization is the technological foundation of our business and works in collaboration with our partners from across the company. The team drives technology and digital transformation, partners with business leaders to design and execute new strategies through IT and operations services and ensures the necessary IT risk management and security measures are in place and aligned with enterprise architecture standards and principles. As the Principal Lead Analyst of DART, you are the ultimate technical authority for cyber defense and incident response. This is a high-impact leadership role that combines elite-level technical expertise with strategic vision. You will oversee the most complex security breaches, drive the evolution of our threat-hunting program, and mentor the next generation of responders. You are responsible for ensuring that the organization is not just "ready" for a crisis, but resilient enough to withstand one. This role partners closely with Cyber Intelligence, Defense and Response, Application Security, and Cyber Resilience teams, and supports incident response efforts as an expert resource on adversarial capabilities.

Requirements

  • 8+ years in Cybersecurity, with at least 5 years in a dedicated Incident Response or DFIR role.
  • Proven experience leading response efforts for a large-scale enterprise or a top-tier IR firm (e.g., Mandiant, CrowdStrike).
  • Solid understanding of deep-system forensics (Memory, Disk, Network) and specialized experience in Cloud IR (Azure/AWS/O365).
  • Deep familiarity with enterprise forensic platforms (Nuix, Magnet AXIOM, EnCase) and the ability to guide L2 analysts in their usage.
  • Expert-level understanding of TTPs (Tactics, Techniques, and Procedures) used by both state-sponsored and financially motivated (Ransomware) threat actors.
  • High proficiency in automation (Python, PowerShell) to build custom response scripts or API integrations between security tools.

Nice To Haves

  • Advanced SANS: GCFA (Forensics), GNFA (Network Forensics), GREM (Reverse Engineering Malware), or GXPN (Exploit Researcher).
  • Leadership: CISSP-ISSMP (Management) or GCIH (Incident Handler).
  • Decisiveness: The ability to make $1M+ decisions (e.g., "Shut down this data center now") with limited information during a live attack.
  • Political Acumen: Skill in navigating the complexities of a large organization, working with Legal, Privacy, and Human Resources during sensitive internal investigations.
  • Resilience: Unwavering composure during high-stress, 24/7 incident cycles.

Responsibilities

  • Serve as the primary Incident Commander for all Tier 3/Critical-level events. You will direct the technical response across all workstreams (Forensics, Network, Cloud, Legal, and PR).
  • Act as the technical voice for executive leadership. You must be able to translate complex exploit chains and technical risks into business-impact narratives for the C-Suite and Board of Directors.
  • Lead "Purple Team" exercises to test DART’s readiness against specific APT (Advanced Persistent Threat) groups and real-world attack scenarios.
  • Design and oversee the organization’s long-term threat-hunting roadmap, ensuring coverage across the MITRE ATT&CK framework for Cloud (Azure/AWS), Identity, and On-Prem infrastructure.
  • Collaborate with engineering teams to ensure that hunt findings are converted into high-fidelity, automated detections and SOAR (Security Orchestration, Automation, and Response) workflows.
  • Direct the consumption of tactical and strategic Threat Intelligence to proactively "harden" the environment before a known threat actor targets the industry.
  • Elevate the entire SOC/DART capability by providing technical mentorship to L1 and L2 analysts. You are responsible for the technical "QA" of the team’s investigative output.
  • Evaluate and select next-generation forensic and response technologies. You will drive the business case for new security investments.
  • Lead the "Lessons Learned" process for major incidents, ensuring that root causes result in fundamental shifts in the enterprise security posture.

Benefits

  • Range of medical, dental and vision insurance plans
  • Mental health support and wellness initiatives
  • Retirement benefits options
  • 401(k) Plan with a generous dollar-for-dollar Company matching contribution of up to 6% of eligible pay and a Company contribution equal to 3% of eligible pay
  • Confidential counseling services and resources
  • Matching charitable donations: Corebridge matches donations to tax-exempt organizations 1:1, up to $5,000.
  • Volunteer Time Off: Employees may use up to 16 volunteer hours annually
  • Paid Time Off (PTO) days
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service