Cyber Threat Intelligence Analyst
New York City
Applications have closed
Peloton
Access high-energy workouts, instantly. Discover Peloton: streaming fitness classes to you live and on-demand.ABOUT THE ROLE
Peloton delivers the connected fitness platform of the future to help our members be the best version of themselves. As a technology-enabled business, our approach to security operations must evolve and grow alongside our services and members. We are looking for a Threat Intelligence Analyst with a diverse set of skills that can thrive in a challenging, fast-paced, and rewarding environment. The growth opportunity that accompanies this role is unique. You will have a chance to build the threat intelligence program from the ground up as well as mature our threat hunting program. You will be part of the Security Operations and Incident Response team, but will work across the company and provide tactical, operational, and strategic threat intelligence to senior leadership, the security organization, and Peloton’s engineering teams. The right candidate should have a strong focus on results, be self-driven, and be excited by the work required to stand up a new function. This position is available for remote work in most US states.
YOUR DAILY IMPACT AT PELOTON
- Collect requirements from stakeholders and conduct research and analysis to provide timely and actionable intelligence that drives and informs Peloton’s security posture
- Stay up to date with relevant vulnerabilities, threat actors, indicators of compromise (IOCs) tactics, techniques, and procedures (TTPs), and trends, identifying actionable areas of interest and threats
- Contribute to improvements of preventative and detective controls
- Assist with digital risk protection utilizing OSINT, threat intelligence solutions and partnerships, industry tools, and MITRE ATT&CK Framework to monitor cyber and physical security risks and provide actionable intelligence across the enterprise
- Work side-by-side with internal network defenders to provide intel-driven insights into existing and emerging threats; including being an active participant during security incident response
- Work with Security Engineering and Vulnerability Management teams to ensure Peloton executes a risk-based vulnerability remediation plan
- Prepare and present analysis with findings and recommendations in the form of briefings, reports, and dashboards to managers, various team leads and senior leadership as required
YOU BRING TO PELOTON
- Minimum 3 years in Threat Intelligence. Alternatively (we are open to newcomers to Threat Intelligence), 5+ years in cybersecurity / information security or a combination of cybersecurity operations, intelligence function (military intelligence, intelligence analyst, etc), and/or incident response experience
- Understanding of common threat analysis models such as the Diamond Model, Cyber Kill Chain, and MITRE ATT&CK
- Experience building research-based reports (presentations, written reports, etc) ideally in cyber threat intelligence
- The ability to communicate complex and technical issues to diverse audiences in an easily understood, authoritative, and actionable manner
- Demonstrated knowledge of incident response methodology and attacker tradecraft
- Bonus points for:
- Threat hunting, red/purple teaming, and/or security incident response experience
- Experience automating and/or scripting with Python, Jupyter Notebooks, etc.
- Previous experience in cloud-native or tech environments
- Security certifications such as GCTI, GCIH, GCIA, etc.
#LI-CM1 #LI-Hybrid
ABOUT PELOTON:
Peloton is the leading interactive fitness platform globally, with a passionate community of nearly 7 million Members in the US, UK, Canada, Germany, and Australia. Peloton makes fitness entertaining, approachable, effective, and convenient, while fostering social connections that motivate its Members to commit to their fitness journeys. An innovator at the nexus of fitness, technology, and media, Peloton reinvented the fitness industry by developing a first-of-its-kind subscription platform that seamlessly combines the best equipment, proprietary networked software, world-class streaming digital fitness and wellness content, and best-in-class fitness experts and Instructors..
Peloton is an equal opportunity employer and committed to creating an inclusive environment for all of our applicants. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
Please be aware that fictitious job openings, consulting engagements, solicitations, or employment offers may be circulated on the Internet in an attempt to obtain privileged information, or to induce you to pay a fee for services related to recruitment or training. Peloton does NOT charge any application, processing, or training fee at any stage of the recruitment or hiring process. All genuine job openings will be posted here on our careers page and all communications from the Peloton recruiting team and/or hiring managers will be from an @onepeloton.com email address.
If you have any doubts about the authenticity of an email, letter or telephone communication purportedly from, for, or on behalf of Peloton, please email applicantaccommodations@onepeloton.com before taking any further action in relation to the correspondence.
Peloton does not accept unsolicited agency resumes. Agencies should not forward resumes to our jobs alias, Peloton employees or any other organization location. Peloton is not responsible for any agency fees related to unsolicited resumes.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Cloud Cyber Kill Chain GCIA GCIH Incident response MITRE ATT&CK OSINT Python Scripting Threat intelligence TTPs Vulnerabilities Vulnerability management
Perks/benefits: Career development
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Product Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cyber Security Specialist jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open Sr. Security Engineer jobs
- Open IT Security Engineer jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open Threat intelligence-related jobs
- Open IAM-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open Forensics-related jobs
- Open Kubernetes-related jobs