Cyber Threat Intelligence Analyst

New York City

Applications have closed

Peloton

Access high-energy workouts, instantly. Discover Peloton: streaming fitness classes to you live and on-demand.

View company page

ABOUT THE ROLE

Peloton delivers the connected fitness platform of the future to help our members be the best version of themselves. As a technology-enabled business, our approach to security operations must evolve and grow alongside our services and members.  We are looking for a Threat Intelligence Analyst with a diverse set of skills that can thrive in a challenging, fast-paced, and rewarding environment. The growth opportunity that accompanies this role is unique. You will have a chance to build the threat intelligence program from the ground up as well as mature our threat hunting program. You will be part of the Security Operations and Incident Response team, but will work across the company and provide tactical, operational, and strategic threat intelligence to senior leadership, the security organization, and Peloton’s engineering teams. The right candidate should have a strong focus on results, be self-driven, and be excited by the work required to stand up a new function. This position is available for remote work in most US states.   

YOUR DAILY IMPACT AT PELOTON

  • Collect requirements from stakeholders and conduct research and analysis to provide timely and actionable intelligence that drives and informs Peloton’s security posture
  • Stay up to date with relevant vulnerabilities, threat actors, indicators of compromise (IOCs) tactics, techniques, and procedures (TTPs), and trends, identifying actionable areas of interest and threats
  • Contribute to improvements of preventative and detective controls
  • Assist with digital risk protection utilizing OSINT, threat intelligence solutions and partnerships, industry tools, and MITRE ATT&CK Framework to monitor cyber and physical security risks and provide actionable intelligence across the enterprise
  • Work side-by-side with internal network defenders to provide intel-driven insights into existing and emerging threats; including being an active participant during security incident response
  • Work with Security Engineering and Vulnerability Management teams to ensure Peloton executes a risk-based vulnerability remediation plan
  • Prepare and present analysis with findings and recommendations in the form of briefings, reports, and dashboards to managers, various team leads and senior leadership as required

YOU BRING TO PELOTON

  • Minimum 3 years in Threat Intelligence. Alternatively (we are open to newcomers to Threat Intelligence), 5+ years in cybersecurity / information security or a combination of cybersecurity operations, intelligence function (military intelligence, intelligence analyst, etc), and/or incident response experience
  • Understanding of common threat analysis models such as the Diamond Model, Cyber Kill Chain, and MITRE ATT&CK
  • Experience building research-based reports (presentations, written reports, etc) ideally in cyber threat intelligence 
  • The ability to communicate complex and technical issues to diverse audiences in an easily understood, authoritative, and actionable manner
  • Demonstrated knowledge of incident response methodology and attacker tradecraft 
  • Bonus points for:
    • Threat hunting, red/purple teaming, and/or security incident response experience 
    • Experience automating and/or scripting with Python, Jupyter Notebooks, etc. 
    • Previous experience in cloud-native or tech environments
    • Security certifications such as GCTI, GCIH, GCIA, etc.

#LI-CM1 #LI-Hybrid

ABOUT PELOTON:

Peloton is the leading interactive fitness platform globally, with a passionate community of nearly 7 million Members in the US, UK, Canada, Germany, and Australia. Peloton makes fitness entertaining, approachable, effective, and convenient, while fostering social connections that motivate its Members to commit to their fitness journeys. An innovator at the nexus of fitness, technology, and media, Peloton reinvented the fitness industry by developing a first-of-its-kind subscription platform that seamlessly combines the best equipment, proprietary networked software, world-class streaming digital fitness and wellness content, and best-in-class fitness experts and Instructors..

Peloton is an equal opportunity employer and committed to creating an inclusive environment for all of our applicants. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.

Please be aware that fictitious job openings, consulting engagements, solicitations, or employment offers may be circulated on the Internet in an attempt to obtain privileged information, or to induce you to pay a fee for services related to recruitment or training. Peloton does NOT charge any application, processing, or training fee at any stage of the recruitment or hiring process. All genuine job openings will be posted here on our careers page and all communications from the Peloton recruiting team and/or hiring managers will be from an @onepeloton.com email address. 

If you have any doubts about the authenticity of an email, letter or telephone communication purportedly from, for, or on behalf of Peloton, please email applicantaccommodations@onepeloton.com before taking any further action in relation to the correspondence.

Peloton does not accept unsolicited agency resumes. Agencies should not forward resumes to our jobs alias, Peloton employees or any other organization location. Peloton is not responsible for any agency fees related to unsolicited resumes.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Cloud Cyber Kill Chain GCIA GCIH Incident response MITRE ATT&CK OSINT Python Scripting Threat intelligence TTPs Vulnerabilities Vulnerability management

Perks/benefits: Career development

Region: North America
Country: United States
Job stats:  27  3  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.