Insider Risk and Counterintelligence Analyst

US, MA, Wilmington

Analog Devices

Analog Devices is a global leader in the design and manufacturing of analog, mixed signal, and DSP integrated circuits to help solve the toughest engineering challenges.

View all jobs at Analog Devices

Apply now Apply later

Analog Devices, Inc. (NASDAQ: ADI) is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and digital healthcare, combat climate change, and reliably connect humans and the world. With revenue of more than $12 billion in FY23 and approximately 26,000 people globally working alongside 125,000 global customers, ADI ensures today’s innovators stay Ahead of What’s Possible. Learn more at www.analog.com and on LinkedIn and Twitter (X)

          

Job Overview
This role reports to the Director of Cybersecurity Strategy and Governance Team. The primary responsibility involves performing triage and analysis for investigations and due diligence, focusing on insider risk and counterintelligence concerns.
Key Responsibilities
Insider Threat Detection and Analysis:

Utilize User Activity Monitoring (UAM), User Behavior Analytics (UBA), and Data Loss Prevention (DLP) and other data sets and tools to analyze technical and behavioral indicators and assist with detection engineering
Conduct analysis, providing assessments of known and emerging threats and
vulnerabilities discovered whether internal or external
Conduct thorough risk assessments to evaluate the potential impact of insider threats.
Develop risk models and methodologies to predict and mitigate insider risks.
Detection Engineering:

Identify critical assets as well as high risk targets and their protection
needs
Threat Hunting:

Perform regular threat hunting activity to learn the operating environment, establish baselines, and improve detections of the unauthorized use of valid system credentials
Incident Response:

Act as an L3 Incident Responder for insider threat incidents. Coordinate with other cybersecurity and IT teams to contain, investigate, and remediate insider-related incidents.
Policy and Procedure Development:

Develop and enhance insider threat policies, procedures, and best practices. Ensure that these align with industry standards and regulatory requirements.
Reporting and Documentation: Create detailed reports on insider threat activities, incidents, and trends. Present findings to senior management and provide actionable recommendations for improving security posture.
Collaboration:

Work closely with various departments, including HR, Legal, and IT, to address
insider threat concerns and ensure comprehensive protection. Engage with external partners and stakeholders as necessary
Training and Awareness:

Design and deliver training programs to educate employees about
insider threats, data protection, and security best practices. Help foster a culture of security awareness across the organization.
Continuous Improvement:

Maintain a working knowledge of the latest tactics, techniques, and
trends related to corporate espionage, insider risks, and industry technology to advance investigations and refine insider threat detection and mitigation strategies.

Qualifications
Education:

Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field. Master’s degree or advanced certifications (e.g., CISSP, CISM) preferred.
Experience:

Minimum of 7 years of experience in cybersecurity, with a focus on insider threat management, risk assessment, and incident response.
Technical Skills:

Hands-on experience with UAM, UBA, DLP tools and platforms. Strong
understanding of network security, data protection, and threat intelligence.
Analytical Skills:

Exceptional analytical and problem-solving skills with the ability to interpret
complex data and make informed decisions. Advanced open-source research skills, including deep and dark web.
Communication:

Excellent verbal and written communication skills, with the ability to present
complex information clearly and effectively to both technical and non-technical audiences.
Leadership:

Proven leadership capabilities with experience managing projects and mentoring junior team members.
Regulatory Knowledge:

Familiarity with relevant regulatory frameworks and standards (e.g., GDPR, HIPAA, SOX).
Preferred Qualifications
Preferred experience in government or private sector security (or intelligence) analysis experience
Preferred experience in semiconductors or highly technical  industries
Open to diverse candidates who may not meet all desired qualifications but demonstrate a fast-learning ability and willingness to grow

For positions requiring access to technical data, Analog Devices, Inc. may have to obtain export  licensing approval from the U.S. Department of Commerce - Bureau of Industry and Security and/or the U.S. Department of State - Directorate of Defense Trade Controls.  As such, applicants for this position – except US Citizens, US Permanent Residents, and protected individuals as defined by 8 U.S.C. 1324b(a)(3) – may have to go through an export licensing review process.

Analog Devices is an equal opportunity employer. We foster a culture where everyone has an opportunity to succeed regardless of their race, color, religion, age, ancestry, national origin, social or ethnic origin, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, parental status, disability, medical condition, genetic information, military or veteran status, union membership, and political affiliation, or any other legally protected group.

EEO is the Law: Notice of Applicant Rights Under the Law.

Job Req Type: Experienced

          

Required Travel: Yes, 10% of the time

          

Shift Type: 1st Shift/Days

          

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Analytics C CISM CISSP Computer Science GDPR Governance HIPAA Incident response Monitoring Network security Risk assessment SOX Strategy Threat detection Threat intelligence Vulnerabilities

Perks/benefits: Career development

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.