Insider Threat Analyst
MEX, Mexico
Ford Motor Company
Since 1903, we have helped to build a better world for the people and communities that we serve. Welcome to Ford Motor Company.Our goal is to mitigate threats and protect information assets, identify security risks, and share industry best practices. The Insider Threat team is responsible to proactively detect, identify, protect, and respond to insider threat risks. This is a highly visible position working with cross-functional senior leadership.
Key Responsibilities:
- Analyze data associated with user behavior to identify patterns, anomalies, and trends; evaluate risk and prioritize threats based on potential impact and likelihood.
- Analyze security incidents to determine their cause, scope, and impact. Triage security incidents and identify the extent of the impacts. Perform root cause analysis to identify vulnerabilities and recommend remediation actions.
- Respond to security incidents and contain them as quickly as possible while following established incident response workflows and playbooks to contain the incident and prevent further damage. Work closely with other teams such as incident responders, IT support staff, and management to coordinate response efforts.
- Securely share and communicate with stakeholders such as management, IT staff, and end users to provide updates on security incident responses and recommend remediation actions. Provide reports on security incidents and recommend improvements to security processes, procedures, and trainings.
- Maintain awareness of internal and industrial security trends and threat intelligence feeds to identify new and emerging security threats.
- Configure and manage enterprise continuous monitoring systems such as User Entity Behavioral Analytics (UEBA) and bring a strong working knowledge of security event outputs from standard Information Security capabilities such as Data Loss Prevention (DLP), Cloud Access Security Broker (CASB), and User Activity Monitoring (UAM) systems. This includes setting up alerts, escalation thresholds, and rules to detect potential security threats.
Must have / Requirements:
- Education - A bachelor's degree in computer science, technology, cybersecurity, information technology, or a related field
- Solid understanding of information security topics such as computer networking, operating systems, databases, security technologies, cloud infrastructure, and data flows
- English language proficiency
- Communication skills - Must be able to communicate effectively with technical and non-technical stakeholders in live settings and through briefings and reports to articulate complex technical concepts in simple terms and provide clear and concise recommendations for remediation.
- Problem solving skills - Must be able to think critically and solve complex problems in a fast-paced and ever-changing environment while considering multidiscipline perspectives. Working knowledge of risk analysis fundamentals that support risk-based decision making.
- Attention to detail - Strong commitment to thoroughness and accuracy with a working knowledge of quality control fundamentals relevant to risk assessments, technical writing, and incident responses.
Nice to have / Desired:
- Relevant experience - one to three years of experience in insider risk management, or related field: incident response, security operations, or security monitoring
- Demonstrated ability to monitor and analyze security events and logs generated by various systems such as: firewalls, Intrusion Detection and Prevention Systems (IDPS), Security Information and Event Management (SIEM) systems, Identity Access Management (IAM) systems, Data Loss Prevention (DLP), User and Entity Behavioral Analytics (UEBA), and Cloud Access Security Broker (CASB) systems.
- Working knowledge of security incident investigation processes and procedures and digital forensic investigations.
- Security-related training, including cybersecurity, risk management, threat intelligence, incident response, and compliance.
- UEBA (User & Entity Behavioral Analytics) specific training, such as UEBA system configuration, modeling, and operations
- Continuing education, industry forums, and relevant certifications to stay current with the latest threats and vulnerabilities
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics CASB Cloud Compliance Computer Science Firewalls IAM Incident response Industrial Intrusion detection Monitoring Risk analysis Risk assessment Risk management SIEM Threat intelligence Vulnerabilities
Perks/benefits: Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Security Analyst jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Principal Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Security Specialist jobs
- Open Security Researcher jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open IT Security Engineer jobs
- Open Sr. Security Engineer jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open SaaS-related jobs
- Open Analytics-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open DevOps-related jobs
- Open Forensics-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs