Synopsys - Washington, DC

posted 11 days ago

Full-time - Mid Level
Washington, DC
Publishing Industries

About the position

The Cybersecurity Analyst - Insider Threat Analyst role at Synopsys involves analyzing and investigating potential insider threats to enhance the security posture of the organization. The position requires a deep understanding of cybersecurity principles, experience with security products, and the ability to analyze large datasets to identify and mitigate risks. The analyst will work cross-functionally with various teams to develop scalable solutions for security event analysis and contribute to a culture of security awareness within the organization.

Responsibilities

  • Analyze and investigate activity on company devices that could represent an insider threat.
  • Work cross-functionally with the Security and People teams to develop solutions for analyzing security events at scale.
  • Interpret disparate data sources to report on trends and support investigative requests.
  • Collect requirements for enhancements to detection models and response systems.
  • Leverage existing systems and data to perform analyses and promote process improvements.
  • Provide actionable insights to help identify, prevent, detect, and respond to anomalous or potentially malicious user activity.
  • Collaborate effectively with teammates, lead projects, mentor others, and develop and champion quality operational standards across the team.

Requirements

  • Bachelor's Degree in Information Security, Computer Science, or equivalent combination of education, training, and experience.
  • 5+ years experience analyzing large data sets to solve problems and/or manage projects related to workplace investigations.
  • Working knowledge of Elastic SIEM, Data Loss Prevention products, and Data Encryption concepts.
  • Familiarity with e-discovery solutions to document and store electronic data for legal procedures.
  • Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements.
  • Functional and practical experience with at least one development or scripting language/framework (e.g., PowerShell, Python, .Net).
  • Data science background with the ability to identify trends, patterns, and anomalies for potential risk.
  • Proven experience with log analysis, digital forensics, or incident response.
  • Proficiency using analytical methods to inform detection systems or guide strategic response.
  • Strong cross-functional collaboration and communication skills.

Nice-to-haves

  • Certifications such as GCIH, GCFE, GCFA, GCSA, GMON, CISSP or other relevant security certifications.

Benefits

  • Competitive salary
  • Health insurance
  • 401k plan
  • Professional development opportunities
  • Flexible work hours
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service