Senior Cyber Threat Analyst

$95,000 - $155,000/Yr

Brown Brothers Harriman - Jersey City, NJ

posted 21 days ago

Full-time - Senior
Jersey City, NJ
Securities, Commodity Contracts, and Other Financial Investments and Related Activities

About the position

As a Senior Cyber Threat Analyst within our Threat Detection Team, you will make a significant impact in enhancing our ability to anticipate, detect, analyze, and respond to cyber threats and proactively mitigating cyber risks effectively. With a focus on Cyber Threat Intelligence (CTI) and Threat Hunting, you will lead efforts to strengthen our security posture through proactive threat analysis, intelligence production, and alignment with industry frameworks and best practice guidance. Collaborating with cross-functional teams and interfacing with organizational leaders, you will contribute to innovative detection and response capabilities that protect our networks, systems, data, employees, and clients. The ideal candidate will have a strong background in cybersecurity with an analytical mindset, a passion for continuous learning and growth, and expertise in enhancing detection capabilities and delivering strategic threat insights.

Responsibilities

  • Perform strategic and operational CTI functions, including producing and disseminating weekly, monthly, and quarterly emails, products, reports, and briefings on the evolving threat landscape to internal stakeholders and senior leaders
  • Monitor open-source, closed-source, and vendor-provided threat intelligence and current events to stay abreast of emerging cyber risks, threats, vulnerabilities, trends, and best practices, and make recommendations for proactive defense strategies and continuous process improvements
  • Enhance threat detection and response capabilities by supporting the development of SOC and incident response (IR) procedures, escalation playbooks, and analyst decision trees
  • Analyze and identify the likely threats targeting the organization through analysis of alert and IOC trends and use this information to build threat intelligence reporting as well as develop threat hunting strategies
  • Develop and maintain threat profiles of relevant threat actors likely to or actively targeting the organization, including a catalog of their tactics, techniques, and procedures (TTPs) aligned with the MITRE ATT&CK framework
  • Assist in SOC and IR escalations and investigations, providing expert guidance and context to ensure IR-related actions are threat-informed, effective, and timely
  • Conduct threat, risk, and vulnerability assessments to provide actionable and prioritized remediation and control enhancement guidance to relevant control and system owners
  • Work with Vulnerability Management to assist with developing and implementing threat-informed patch prioritization efforts, including through direct engagement with systems owners
  • Collaborate with the Red Team and Cyber Incident Management to develop relevant red team assessments, penetration tests, incident response trainings, and tabletop exercises
  • Using a threat-informed approach, plan and perform threat hunting activities by proactively searching across various logs within the Security Incident and Event Management (SIEM) solution and other security tools to identify previously undetected and unknown anomalous and malicious activity and indicators
  • Conduct proactive analysis of alert trends to support intelligence reporting and to identify and prioritize missing or ineffective detection capabilities
  • Perform privileged and general user access reviews across various platforms (Windows, Unix/Linux, RHEL, databases, network components, applications, cloud infrastructure) to identify anomalies and escalate appropriately
  • Collaborate with DLP and other security teams on insider risk initiatives, collaborating and coordinating efforts to identify and mitigate potential threats from within
  • Develop and uphold procedures, standards, and policies for CTI and threat hunting processes
  • Collaborate with relevant stakeholders on security awareness messaging and training

Requirements

  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field
  • 5+ years of experience in Cyber Threat Intelligence, Security Operations, Incident Response, Threat Hunting, and/or related roles
  • Significant relevant experience (e.g., military) in one or more of the above roles may be considered in lieu of a degree
  • Familiarity with the Intelligence Cycle, Threat Intelligence Platforms, and the MITRE ATT&CK Framework
  • Excellent collaboration and communication skills, particularly in high-stress situations
  • Ability to produce products at the tactical, operational, and strategic level and to articulate findings and assessments effectively
  • A desire to understand and maintain awareness of changes to the cyber threat and risk landscape, including related geopolitical risks that may impact our overall security posture
  • Strong analytical skills and priority management

Nice-to-haves

  • Master's degree in Cybersecurity, Computer Science, Information Technology, or related field
  • Hands-on experience in three or more of the following areas: Security Operations, Incident Response, Cyber Threat Intelligence, Threat Hunting, Detection Engineering, Security Engineering, Insider Threat Analysis, Digital Forensics, All-Source Intelligence, Penetration Testing, Red Teaming, Network Security Management, Cyber Risk Management, Cloud Security, Vulnerability Management
  • Experience in the financial services industry and familiarity with security best practices and frameworks (e.g., FFIEC, NIST CSF, ISO 27001, SWIFT, NYDFS, OWASP)
  • Experience with threat hunting and developing custom detection rules using query languages in a SIEM (e.g., Splunk SPL) and/or other log sources (e.g., Microsoft Advanced Hunting KQL)
  • Experience with perimeter, host, and identity defense and monitoring technologies such as EDR/AV, IDS/IPS, Firewalls, WAF, DLP, UEBA, email gateway, sandboxing, and other security tools and terminology
  • Familiarity with risk scoring, threat analysis, threat hunting, and threat modeling techniques.
  • Experience with Microsoft Defender (MDE, MDI, Defender for Cloud Apps) and Purview Insider Risk Management
  • Relevant certifications such as CISSP, GCIH, GSEC, GCTI, CTIA, CEH, Security+
  • Experience with programming or scripting (Python, SQL, Powershell)

Benefits

  • High-quality benefits program emphasizing good health, financial security, and peace of mind
  • Opportunities to grow expertise and take on new challenges
  • Flexibility to enjoy personal and family experiences at every career stage
  • Volunteer opportunities through BBH Cares program
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service