Forensic Analyst Jobs

77 jobs found — updated daily

Insider Threat Senior Analyst

KeyBankBrooklyn, OH
Hybrid

About The Position

Our Cyber Threat Management team rolls up into Key’s broader Cyber Defense function within Corporate Information Security. Cyber Defense’s mission is simple: We aim to Deter, Detect, Deny, and Disrupt adversaries through proactive threat-centric defense. The Senior Insider Threat and Threat Hunting Analyst is a key member of the Cyber Threat Management (CTM) team. This role has responsibilities across both Insider Threat and Threat Hunting functions, with a primary focus on Insider Threat and a secondary focus on Threat Hunting. In this role, you will perform hands‑on technical analysis related to insider threat investigations and proactive threat hunting activities. You will also play a critical role in maturing both programs by assessing current capabilities, identifying potential enhancements, and recommending improvements to processes, tools, and detection strategies. This position blends deep technical execution with strategic program development to strengthen KeyBank’s overall threat posture. You will develop and maintain a deep understanding of the insider threat and cyber threat landscapes, by utilizing threat intelligence related to insider threats, along with threat actor Tactics, Techniques and Procedures (TTPs), and their associated threats, to support mitigation efforts while leveraging frameworks such as MITRE ATT&CK. This position requires strong insider threat and threat hunting investigation skills, and advanced knowledge of cybersecurity fundamentals and concepts. Success in this role demands an independent, thorough, and adaptable individual who can deliver accurate and complete intelligence outputs.

Requirements

  • Bachelor’s in Computer Science, Cybersecurity, or related field—or equivalent experience
  • 5+ years in Insider Threat and/or Threat Hunting roles.
  • Strong analytical, research, and writing skills.
  • Proficiency with Insider Threat and Threat Hunting tools, along with experience with log analysis.
  • Deep understanding of the MITRE ATT&CK framework and adversary TTPs.
  • Strong ability to communicate concisely, effectively and directly with executive management.
  • Ability to work independently and escalate risks appropriately.

Nice To Haves

  • GIAC Cyber Threat Intelligence (GCTI)
  • GIAC Certified Forensic Analyst (GCFA)
  • Certified Information Systems Security Professional (CISSP)
  • CompTIA Cybersecurity Analyst (CySA+)
  • CompTIA Security+

Responsibilities

  • Hands-on experience in Insider Threat, including conducting sensitive investigations, use case development, detection development and Insider Threat platforms such as User and Entity Behavior Analytics (UEBA), User Activity Monitoring (UAM), Security Information and Event Management (SIEM) or similar technologies.
  • Conduct comprehensive monitoring and analysis of insider threat indicators.
  • Preserve evidence, prepare detailed reports, and present findings to key stakeholders, including HR and Legal.
  • Hands-on experience in designing and executing proactive, hypothesis-driven threat hunts across endpoints, networks, and cloud environments, leveraging threat intelligence and behavioral indicators to uncover hidden threats.
  • Apply deep knowledge of attacker tactics, techniques, and procedures (TTPs) to build proactive detections and alerts for potential adversary activities, leveraging threat intelligence and analytical insights.
  • Skilled in using security platforms such as Extended Detection and Response (XDR) and Security Information and Event Management (SIEM), along with the ability to analyze logs from diverse sources including Windows, Linux, cloud environments, and network devices.
  • Drive the evolution of the Insider Threat and Threat Hunt programs by advising on best practices, maintaining thorough documentation, enhancing metrics, and implementing improvements to increase organizational resilience.
  • Good knowledge of the cyber threat landscape (financial sector experience is beneficial) and the ability to communicate those threats to senior leadership, technical and non-technical audiences.
  • Apply frameworks (Ex. MITRE ATT&CK) to enhance detection and response.
  • Leverage automation to enhance intelligence gathering and processing, utilizing scripting languages and standardized frameworks such as Python, APIs, and STIX/TAXII.
  • Produce written reports, threat assessments, and briefings for technical and non-technical stakeholders.
  • Collaborate closely within and outside of the CTM team.
  • Participate, as needed, in technical incident response activities.
  • Actively engage in tabletop exercises and red/blue/purple team activities.
  • Interface with stakeholders withing Cyber Defense, the broader security organization, and those outside of security such as technology, fraud, HR and other lines of business partners.
  • Provide mentorship and technical guidance to junior analysts and cross-functional partners.
  • Lead by example in fostering a culture of curiosity, rigor, and continuous learning within these functions.

Benefits

  • eligibility for incentive compensation which may include production, commission, and/or discretionary incentives

Build a Resume for Forensic Analyst

The resume builder that gets results.

  • Get clear feedback so you look as qualified as you are
  • Align your resume with the job to get further in the process, faster
  • Take the guesswork out of resume writing

Explore Related Job Searches

Frequently Asked Questions

Common questions about Forensic Analyst careers and jobs.

Based on current job postings on Teal, the average Forensic Analyst salary in the US is approximately $104,000 per year, with a typical range of $65,000 to $157,000.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service