Insider Threat Analyst | DLP/Endpoint Protection/IR
Irvine, CA, United States
Trace3
Trace3 delivers business transformation. We consult on, integrate, and operate convergent solutions across data, security and cloud that embrace emerging technology and drive measurable value.Who is Trace3?
Trace3 is a leading Transformative IT Authority, providing unique technology solutions and consulting services to our clients. Equipped with elite engineering and dynamic innovation, we empower IT executives and their organizations to achieve competitive advantage through a process of Integrate, Automate, Innovate.
Our culture at Trace3 embodies the spirit of a startup with the advantage of a scalable business. Employees can grow their career and have fun while doing it!
Trace3 is headquartered in Irvine, California. We employ more than 1,200 people all over the United States. Our major field office locations include Denver, Indianapolis, Grand Rapids, Lexington, Los Angeles, Louisville, Texas, San Francisco.
Ready to discover the possibilities that live in technology?
Come Join Us!
Street-Smart - Thriving in Dynamic Times
We are flexible and resilient in a fast-changing environment. We continuously innovate and drive constructive change while keeping a focus on the “big picture.” We exercise sound business judgment in making high-quality decisions in a timely and cost-effective manner. We are highly creative and can dig deep within ourselves to find positive solutions to different problems.
Juice - The “Stuff” it takes to be a Needle Mover
We get things done and drive results. We lead without a title, empowering others through a can-do attitude. We look forward to the goal, mentally mapping out every checkpoint on the pathway to success, and visualizing what the final destination looks and feels like.
Teamwork - Humble, Hungry and Smart
We are humble individuals who understand how our job impacts the company's mission. We treat others with respect, admit mistakes, give credit where it’s due and demonstrate transparency. We “bring the weather” by exhibiting positive leadership and solution-focused thinking. We hug people in their trials, struggles, and failures – not just their success. We appreciate the individuality of the people around us.
Job Summary:
The Insider Threat Analyst will play a critical role in identifying, analyzing, and mitigating threats posed by individuals within the organization, whether they are intentional or accidental. The Analyst will focus on preventing data breaches, intellectual property theft, fraud, sabotage, or other security incidents. This role requires a mix of behavioral analysis, cybersecurity expertise, and understanding of internal security protocols.
Key Responsibilities:
Monitor and Analyze Insider Threat Indicators:
- Continuously monitor insider activities across the network, endpoints, and applications using various security tools.
- Identify abnormal patterns of behavior and potential security risks, including data exfiltration, misuse of credentials, and policy violations.
Incident Detection and Response:
- Conduct real-time analysis of insider threat events, including unauthorized data transfers, inappropriate use of company resources, and violations of security protocols.
- Escalate and respond to security incidents related to insider threats in collaboration with incident response teams.
Collaboration and Communication:
- Work closely with Forensics, Legal, HR, IT, Risk Management and Global Security teams to ensure a coordinated response to insider incidents.
- Communicate findings to stakeholders and provide recommendations to mitigate risks.
Continuous Improvement and Reporting:
- Regularly review and refine insider threat detection capabilities and tools.
- Create reports on insider threat trends, incidents, and preventive measures.
- Provide actionable insights and recommendations to enhance internal threat monitoring strategies.
Risk Assessment and Mitigation:
- Evaluate internal risks associated with employee behavior, third-party access, and other internal vulnerabilities.
- Develop strategies to minimize risks and provide ongoing awareness training for employees about potential insider threats.
- Partner with appropriate parties to deliver risk mitigating solutions.
Security Program Development:
- Support the development and implementation of an Insider Threat Program, ensuring compliance with relevant regulations and best practices.
- Maintain UpToDate knowledge of emerging threats, technologies, and security challenges related to insider threats.
Key Skills & Qualifications:
Education:
Strong knowledge in the areas of Cybersecurity, Information Technology, Computer Science, or related field.
Experience:
2+ years of experience in cybersecurity, threat analysis, or related roles.
Experience with insider threat detection tools (e.g.,UAM, UEBA, SIEM, DLP) and technologies.
Skills:
- Strong understanding of data loss prevention (DLP), endpoint security, network monitoring, and incident response.
- Ability to identify and investigate anomalous insider behaviors using behavioral analytics and cybersecurity tools.
- Proficiency in forensics tools and techniques.
- Excellent analytical and communication skills.
Certifications (Preferred):
Certified Information Systems Security Professional (CISSP)
Certified Ethical Hacker (CEH)
Certified Insider Threat Program Manager (CITPM)
Actual salary will be based on a variety of factors, including location, experience, skill set, performance, licensure and certification, and business needs. The range for this position in other geographic locations may differ. Certain positions may also be eligible for variable incentive compensation, such as bonuses or commissions, that is not included in the base salary.Estimated Pay Range$80,000—$114,400 USD
The Perks:
- Comprehensive medical, dental and vision plans for you and your dependents
- 401(k) Retirement Plan with Employer Match, 529 College Savings Plan, Health Savings Account, Life Insurance, and Long-Term Disability
- Competitive Compensation
- Training and development programs
- Stocked kitchen with snacks and beverages
- Collaborative and cool culture
- Work-life balance and generous paid time off
***To all recruitment agencies: Trace3 does not accept unsolicited agency resumes/CVs. Please do not forward resumes/CVs to our careers email addresses, Trace3 employees or any other company location. Trace3 is not responsible for any fees related to unsolicited resumes/CVs.
Tags: Analytics CEH CISSP Compliance Computer Science Endpoint security Forensics Incident response Monitoring Risk assessment Risk management SIEM Threat detection Vulnerabilities
Perks/benefits: 401(k) matching Career development Competitive pay Flex vacation Health care Insurance Salary bonus Snacks / Drinks Startup environment Team events Transparency
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.