Logo of Huzzle

Insider Threat Analyst - 642

image

Quantinuum

23d ago

  • Job
    Full-time
    Senior Level
  • Data
    IT & Cybersecurity
  • Broomfield
    Remote

AI generated summary

  • You must have a Bachelor's degree, 5+ years in insider threat analysis, experience with DTEX, and be a U.S. citizen or qualified U.S. Person, not a China or Russia national unless a U.S. citizen.
  • You will monitor alerts, analyze user behavior, conduct investigations, collaborate with teams, and enhance insider threat detection and responses through metrics and training.

Requirements

  • Bachelor's degree minimum
  • Minimum 5+ years of experience in insider threat analysis or a related cybersecurity discipline
  • Minimum 5+ years' experience with DTEX or similar insider threat monitoring platforms
  • Due to Contractual requirements, must be a U.S. Person defined as, U.S. citizen permanent resident or green card holder, workers granted asylum or refugee status
  • Due to national security requirements imposed by the U.S. Government, candidates for this position must not be a People's Republic of China national or Russian national unless the candidate is also a U.S. citizen.

Responsibilities

  • Review, triage, and prioritize alerting from DTEX, Microsoft Purview, and other monitoring platforms
  • Develop, tune, and optimize insider threat detection use cases across UEBA, DLP, SIEM, and endpoint monitoring platforms
  • Monitor and analyze DTEX telemetry to identify high-risk user behaviors and potential data exfiltration activities
  • Leverage Microsoft Purview for data loss prevention, information protection, and insider risk management capabilities
  • Utilize Microsoft Entra ID for identity analytics, access reviews, and monitoring privileged account activity
  • Conduct behavioral analysis to identify anomalous patterns indicative of data exfiltration, fraud, sabotage, or policy violations
  • Perform proactive threat hunting to discover previously undetected insider risks and develop corresponding detection mechanisms
  • Analyze technical indicators alongside contextual information such as HR events, travel data, and organizational changes to assess risk holistically
  • Conduct investigations of insider threat incidents, from initial triage through remediation
  • Coordinate with Legal, HR, and external law enforcement as required during sensitive investigations
  • Prepare detailed investigation reports and briefings for leadership
  • Create, maintain, and update insider threat playbooks and response procedures to ensure consistent and effective incident handling
  • Contribute to insider threat program strategy and maturity roadmap
  • Develop and maintain insider threat metrics, KPIs, and dashboards to measure program effectiveness
  • Manage and deliver insider threat awareness training for employees, managers, and security teams
  • Stay current on insider threat trends, TTPs, and emerging technologies; recommend program enhancements accordingly

FAQs

Do we support remote work?

Yes, we offer remote work potential for this position.

What qualifications are required for this role?

A minimum of a Bachelor's degree and at least 5+ years of experience in insider threat analysis or a related cybersecurity discipline are required.

Is there a specific background needed in insider threat monitoring platforms?

Yes, candidates should have a minimum of 5+ years of experience with DTEX or similar insider threat monitoring platforms.

Are there any national security requirements for candidates?

Yes, candidates must be U.S. persons, and those who are nationals of the People's Republic of China or Russia must also be U.S. citizens due to national security requirements.

What are the key responsibilities of the Insider Threat Analyst?

Responsibilities include detection and analysis of alerts, conducting investigations, developing insider threat detection strategies, and contributing to program development.

What technical skills are valued for this position?

Proficiency with Microsoft Purview, Microsoft Entra ID, UEBA platforms, SIEM platforms, and experience with log analysis and query languages is valued.

Are there any specific experiences that are preferred for candidates?

Yes, demonstrated experience with data theft investigations and familiarity with behavioral psychology and human-centered security approaches are preferred.

What is the salary range for this position?

The salary range for this role is $89,000 to $112,000 annually, depending on experience and qualifications.

What benefits do employees receive?

Benefits include employer-subsidized health, dental, and vision insurance, a 401(k) match, equity options, paid holidays, generous vacation and sick time, and paid parental leave.

Is Quantinuum an equal opportunity employer?

Yes, Quantinuum is an equal opportunity employer and considers applicants without regard to various personal characteristics.

Science led and enterprise driven, we’re accelerating quantum computing to solve the world’s most pressing challenges.

Technology
Industry
201-500
Employees
2021
Founded Year

Mission & Purpose

Science led and enterprise driven, Quantinuum unites Cambridge Quantum’s best-in-class software with Honeywell Quantum Solutions’ high-performing trapped-ion hardware. We are scaling quantum computing and developing applications today to solve the world’s most pressing challenges.