hero

AEG Job Board

Discover career opportunities in the AEG Sponsor network

Sr Insider Threat Analyst

Constellation Energy

Constellation Energy

IT
Point, TX, USA · Baltimore, MD, USA · United States
Posted 6+ months ago

WHO WE ARE

As the nation's largest producer of clean, carbon-free energy, Constellation is focused on our purpose: accelerating the transition to a carbon-free future. We have been the leader in clean energy production for more than a decade, and we are cultivating a workplace where our employees can grow, thrive, and contribute.

Our culture and employee experience make it clear: We are powered by passion and purpose. Together, we're creating healthier communities and a cleaner planet, and our people are the driving force behind our success. At Constellation, you can build a fulfilling career with opportunities to learn, grow and make an impact. By doing our best work and meeting new challenges, we can accomplish great things and help fight climate change. Join us to lead the clean energy future.

TOTAL REWARDS

Constellation offers a wide range of benefits and rewards to help our employees thrive professionally and personally. We provide competitive compensation and benefits that support both employees and their families, helping them prepare for the future. In addition to highly competitive salaries, we offer a bonus program, 401(k) with company match, employee stock purchase program; comprehensive medical, dental and vision benefits, including a robust wellness program; paid time off for vacation, holidays, and sick days; and much more.

Expected salary range of $126,900 to $141,000, varies based on experience, along with comprehensive benefits package that includes bonus and 401(k).

PRIMARY PURPOSE OF POSITION

The Sr. Insider Threat Analyst is a member of the Insider Threat Team with primary responsibility for mitigating, identifying, and responding to insider threat security events. The Insider Threat team is responsible for preventing, detecting, and responding to data exfiltration, workplace violence, systems sabotage, misuse of corporate assets, and other threats. Lead and conduct complex and technical data analysis; develop and tune rules, policies, and alerts for DLP and UEBA applications; develop strategies to deter, detect, and respond to insider threats; and collaborate with security operation centers, digital forensics, and physical security teams.

PRIMARY DUTIES AND ACCOUNTABILITIES

  • Identify and Respond to Insider Threat Security Events
    • Respond, analyze, and triage alerts from DLP, UEBA and other monitoring tools.
    • Characterize and analyze information from enterprise cyber security tools identify anomalous activity and potential threats.
    • Coordinate with enterprise-wide cyber defense staff to validate network alerts.
    • Analyze security incidents for trends and patterns to uncover anomalies, identify gaps, and propose risk mitigation solutions.
    • Manage incident response and investigative leads, including notification and escalation. Coordinate with physical security, legal, and HR teams as required.
  • Develop Insider Threat Use Cases and Tune DLP and UEBA rules and policies
    • Develop distinct insider threat use cases; identify tools, policies, and rules to monitor for the use case; tune policies and rules to meet use case requirements
    • Based on analysis of alerts, modify rules and policies to increase accuracy and reduce false positives
    • Identify and integrate new data sources to identify insider threat activity
  • Perform security reviews, cyber defense trend analysis and open-source research.
    • Identify vulnerabilities in security architecture or controls; and recommended changes to resolve or mitigate risk of these vulnerabilities
    • Analyze insider events to identify patterns and develop mitigation strategies.
    • Conduct open-source research about industry trends and developments in protecting company assets and countering Insider Threats.
    • Prepare timely written reports which summarize significant industry insider events to draw lessons which can be incorporated into the Insider Threat Program
  • Assist in the development of policy, processes, procedures an associated metrics
  • Produce and deliver insider threat awareness briefings, debriefings, and training activities.

MINIMUM QUALIFICATIONS

  • Bachelor's Degree in Computer Science, Cybersecurity, or related 4-year technical degree with 5 + years of experience in IT or cybersecurity, or equivalent combination of education and work experience.
  • Skill in collecting data from a variety of cyber defense resources and ability to interpret information collected to recognize threats.
  • Knowledge of DLP, UEBA, and logging applications; and skill tuning policies within these tools.
  • Knowledge of incident response and handling methodologies.
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of host/network access control mechanisms.
  • Knowledge of operating systems.
  • Knowledge of scripting languages.
  • Knowledge of cyber-attack stages and techniques used by malicious insiders.
  • Knowledge of security controls frameworks and ability to assess organizational security posture against these frameworks.
  • Skill in conducting trend analysis

PREFERRED QUALIFICATIONS

  • 5+ years of direct insider threat analysis experience.
  • CISSP, SANS GIAC, or other relevant certifications.
  • Demonstrated skill in modifying and developing UEBA rules through advanced editors and scripting languages.
  • Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations.
  • Knowledge of NIST SP 800-53 Cybersecurity Framework.
  • CERT Insider Threat Program Manager Professional Certificate and/or knowledge of Carnegie Mellon's Insider Threat Best Practices.
  • Strong verbal and written communication skills. Ability to effectively convey complex technical information to both technical and non-technical audiences including investigators, senior management, team members and others