Senior Cyber Threat Analyst
Jersey City
Brown Brothers Harriman
At Brown Brothers Harriman, we serve the most sophisticated individuals and institutions with expertise through our focused business lines: Investor Services, which offers custody, accounting, administration, capital market services, and...At BBH we value diverse backgrounds, so if your experience looks a little different from what we've outlined and you think you can bring value to the role, we will still welcome your application!
What You Can Expect At BBH:
If you join BBH you will find a collaborative environment that enables you to step outside your role to add value wherever you can. You will have direct access to clients, information and experts across all business areas around the world. BBH will provide you with opportunities to grow your expertise, take on new challenges, and reinvent yourself—without leaving the firm. We encourage a culture of inclusion that values each employee’s unique perspective. We provide a high-quality benefits program emphasizing good health, financial security, and peace of mind. Ultimately we want you to have rewarding work with the flexibility to enjoy personal and family experiences at every career stage. Our BBH Cares program offers volunteer opportunities to give back to your community and help transform the lives of others.
As a Senior Cyber Threat Analyst within our Threat Detection Team, you will make a significant impact in enhancing our ability to anticipate, detect, analyze, and respond to cyber threats and proactively mitigating cyber risks effectively. With a focus on Cyber Threat Intelligence (CTI) and Threat Hunting, you will lead efforts to strengthen our security posture through proactive threat analysis, intelligence production, and alignment with industry frameworks and best practice guidance. Collaborating with cross-functional teams and interfacing with organizational leaders, you will contribute to innovative detection and response capabilities that protect our networks, systems, data, employees, and clients. The ideal candidate will have a strong background in cybersecurity with an analytical mindset, a passion for continuous learning and growth, and expertise in enhancing detection capabilities and delivering strategic threat insights.
Duties and Responsibilities:
- Perform strategic and operational CTI functions, including producing and disseminating weekly, monthly, and quarterly emails, products, reports, and briefings on the evolving threat landscape to internal stakeholders and senior leaders
- Monitor open-source, closed-source, and vendor-provided threat intelligence and current events to stay abreast of emerging cyber risks, threats, vulnerabilities, trends, and best practices, and make recommendations for proactive defense strategies and continuous process improvements
- Enhance threat detection and response capabilities by supporting the development of SOC and incident response (IR) procedures, escalation playbooks, and analyst decision trees
- Analyze and identify the likely threats targeting the organization through analysis of alert and IOC trends and use this information to build threat intelligence reporting as well as develop threat hunting strategies
- Develop and maintain threat profiles of relevant threat actors likely to or actively targeting the organization, including a catalog of their tactics, techniques, and procedures (TTPs) aligned with the MITRE ATT&CK framework
- Assist in SOC and IR escalations and investigations, providing expert guidance and context to ensure IR-related actions are threat-informed, effective, and timely
- Conduct threat, risk, and vulnerability assessments to provide actionable and prioritized remediation and control enhancement guidance to relevant control and system owners
- Work with Vulnerability Management to assist with developing and implementing threat-informed patch prioritization efforts, including through direct engagement with systems owners
- Collaborate with the Red Team and Cyber Incident Management to develop relevant red team assessments, penetration tests, incident response trainings, and tabletop exercises
- Using a threat-informed approach, plan and perform threat hunting activities by proactively searching across various logs within the Security Incident and Event Management (SIEM) solution and other security tools to identify previously undetected and unknown anomalous and malicious activity and indicators
- Conduct proactive analysis of alert trends to support intelligence reporting and to identify and prioritize missing or ineffective detection capabilities
- Perform privileged and general user access reviews across various platforms (Windows, Unix/Linux, RHEL, databases, network components, applications, cloud infrastructure) to identify anomalies and escalate appropriately
- Collaborate with DLP and other security teams on insider risk initiatives, collaborating and coordinating efforts to identify and mitigate potential threats from within
- Develop and uphold procedures, standards, and policies for CTI and threat hunting processes
- Collaborate with relevant stakeholders on security awareness messaging and training
Required Qualifications:
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field
- 5+ years of experience in Cyber Threat Intelligence, Security Operations, Incident Response, Threat Hunting, and/or related roles
- Significant relevant experience (e.g., military) in one or more of the above roles may be considered in lieu of a degree
- Familiarity with the Intelligence Cycle, Threat Intelligence Platforms, and the MITRE ATT&CK Framework
- Excellent collaboration and communication skills, particularly in high-stress situations
- Ability to produce products at the tactical, operational, and strategic level and to articulate findings and assessments effectively
- A desire to understand and maintain awareness of changes to the cyber threat and risk landscape, including related geopolitical risks that may impact our overall security posture
- Strong analytical skills and priority management
Nice to Have:
- Master’s degree in Cybersecurity, Computer Science, Information Technology, or related field
- Hands-on experience in three or more of the following areas: Security Operations, Incident Response, Cyber Threat Intelligence, Threat Hunting, Detection Engineering, Security Engineering, Insider Threat Analysis, Digital Forensics, All-Source Intelligence, Penetration Testing, Red Teaming, Network Security Management, Cyber Risk Management, Cloud Security, Vulnerability Management
- Experience in the financial services industry and familiarity with security best practices and frameworks (e.g., FFIEC, NIST CSF, ISO 27001, SWIFT, NYDFS, OWASP)
- Experience with threat hunting and developing custom detection rules using query languages in a SIEM (e.g., Splunk SPL) and/or other log sources (e.g., Microsoft Advanced Hunting KQL)
- Experience with perimeter, host, and identity defense and monitoring technologies such as EDR/AV, IDS/IPS, Firewalls, WAF, DLP, UEBA, email gateway, sandboxing, and other security tools and terminology
- Familiarity with risk scoring, threat analysis, threat hunting, and threat modeling techniques.
- Experience with Microsoft Defender (MDE, MDI, Defender for Cloud Apps) and Purview Insider Risk Management
- Relevant certifications such as CISSP, GCIH, GSEC, GCTI, CTIA, CEH, Security+
- Experience with programming or scripting (Python, SQL, Powershell)
Salary Range
$95,000-$155,000
BBH’s compensation program includes base salary, discretionary bonuses, and profit-sharing. The anticipated base salary range(s) shown above are only for the indicated location(s) and may differ in other locations due to cost of living and labor considerations. Base salaries may vary based on factors such as skill, experience and qualification for the role. BBH's total rewards package recognizes your contributions with more than just a paycheck—providing you with benefits that enhance your experience at BBH from long-term savings, healthcare, and income protection to professional development opportunities and time off, our programs support your overall well-being.
Tags: CEH CISSP Cloud Computer Science EDR FFIEC Firewalls Forensics GCIH GCTI GSEC IDS Incident response IPS ISO 27001 Linux MITRE ATT&CK Monitoring Network security NIST OWASP Pentesting PowerShell Python Red team Risk management Scripting SIEM SOC Splunk SQL Threat detection Threat intelligence TTPs UNIX Vulnerabilities Vulnerability management Windows
Perks/benefits: Career development Health care Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.