Cyber Threat Analyst (Pathways Military Program, SkillBridge/MilSpouse, Remote)

Remote Location - United States of America

Apply now Apply later

Who are we?

Equinix is the world’s digital infrastructure company®, operating over 250 data centers across the globe. Digital leaders harness Equinix's trusted platform to bring together and interconnect foundational infrastructure at software speed. Equinix enables organizations to access all the right places, partners and possibilities to scale with agility, speed the launch of digital services, deliver world-class experiences and multiply their value, while supporting their sustainability goals. 

 

Our culture is based on collaboration and the growth and development of our teams.  We hire hardworking people who thrive on solving challenging problems and give them opportunities to hone new skills and try new approaches, as we grow our product portfolio with new software and network architecture solutions. We embrace diversity in thought and contribution and are committed to providing an equitable work environment that is foundational to our core values as a company and is vital to our success. 

Cyber Threat Analyst (Pathways Military Program, SkillBridge/MilSpouse, Remote)

This is not the official application; you must first speak with a representative from Equinix Pathways Military Program. Please note that this program is exclusively for Military Spouse Fellows or Active-duty US military personnel.

Note: This role is focused on research and data analysis to provide crucial information, rather than offensive operations.

This key position is responsible for researching, analyzing, and reporting on cyber incidents affecting our global business. The role involves evaluating potential cyber threats, guiding vulnerability management, and developing analytics and automation to enhance intelligence activities.

Responsibilities:

  • Monitor and alert on cyber threats impacting Equinix and its partners.

  • Assess and prioritize cyber vulnerabilities in company technologies.

  • Develop predictive analytics and threat actor profiles.

  • Coordinate closely with other information security teams.

  • Deliver threat-related briefings to executive management.

SkillBridge Program: This role is part of the SkillBridge program, providing transitioning service members with valuable civilian work experience through specific industry training, apprenticeships, or internships. Ideal candidates would be intelligence analysts and operators, similar to military intel roles.

Qualifications:5+ years in cyber threat intelligence, preferably working within cross-disciplinary teams.

  • Experience in taking intelligence-related requirements and turning them into final products or presentations on time and on point.

  • Strong knowledge of cyber security threat actors, particularly their tactics, techniques, procedures, tradecraft, and noteworthy attacks.

  • Exceptional communications skills (oral and written) with a history of successfully engaging with multiple levels of leadership.

  • Understanding of technology systems such as networks, applications, servers, cloud, authentication, and emerging technologies.

  • Experience working with information security teams such as fusion centers, security operations centers, vulnerability assessment, vulnerability threat management, security incident management, cyber “hunt,” and big data analysis.

  • Must be a self-starter, self-motivated, and able to work independently with little oversight

  • Bachelor’s Degree preferred.

  • Degrees and/or Certifications in computer forensics, information security, and similar preferred.

The United States targeted pay range for this position in the following location is / locations are:

• San Francisco, CA / Bay Area: $102,000 to $162,000 per year
• California (Non-SF/Bay Area), Connecticut, Maryland, New York, New Jersey, Washington state: $94,000 to $149,000 per year
• Colorado, Nevada, Rhode Island: $85,000 to $135,000 per year

Our pay ranges reflect the minimum and maximum target for new hire pay for the full-time position determined by role, level, and location. Individual pay is based on additional factors including job-related skills, experience, and relevant education and/or training.

This position may be offered in other locations. Your recruiter can share more about the specific pay range for your preferred location during the hiring process.

The targeted pay range listed reflects the base pay only and does not include bonus, equity, or benefits. Employees are eligible for bonus, and equity may be offered depending on the position.

As an employee, you become important to Equinix’s success. Details about our company benefits can be found at the following link:

USA Benefits eBook

Equinix is committed to ensuring that our employment process is open to all individuals, including those with a disability.  If you are a qualified candidate and need assistance or an accommodation, please let us know by completing this form.

Equinix is an Equal Employment Opportunity and, in the U.S., an Affirmative Action employer.  All qualified applicants will receive consideration for employment without regard to unlawful consideration of race, color, religion, creed, national or ethnic origin, ancestry, place of birth, citizenship, sex, pregnancy / childbirth or related medical conditions, sexual orientation, gender identity or expression, marital or domestic partnership status, age, veteran or military status, physical or mental disability, medical condition, genetic information, political / organizational affiliation, status as a victim or family member of a victim of crime or abuse, or any other status protected by applicable law. 

Apply now Apply later
  • Share this job via
  • or
Job stats:  14  6  0

Tags: Analytics Automation Big Data Cloud Forensics Threat intelligence Vulnerabilities Vulnerability management

Perks/benefits: Career development Salary bonus

Region: Remote/Anywhere

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.