Lead Cyber Threat Intelligence Analyst
Irving, TX, USA - 6555 North State Highway 161 (P001)
Full Time Senior-level / Expert USD 139K - 231K
McKesson
The leading healthcare company for wholesale medical supplies & equipment, pharmaceutical distribution, and healthcare technology solutions.McKesson is an impact-driven, Fortune 10 company that touches virtually every aspect of healthcare. We are known for delivering insights, products, and services that make quality care more accessible and affordable. Here, we focus on the health, happiness, and well-being of you and those we serve – we care.
What you do at McKesson matters. We foster a culture where you can grow, make an impact, and are empowered to bring new ideas. Together, we thrive as we shape the future of health for patients, our communities, and our people. If you want to be part of tomorrow’s health today, we want to hear from you.
MINIMUM EDUCATION & TYPICAL EXPERIENCE OR EQUIV. COMBINATION: Degree or equivalent experience. Typically has 10+ years of professional experience. CAREER LEVEL: P5
McKesson’s Lead Cyber Threat Intelligence Analyst will be a member of our global cyber threat intelligence team responsible for advancing knowledge of threat actors’ goals, strategy, and tactics. This team is responsible for collecting, analyzing, and disseminating Cyber Threat Intelligence (CTI) enabling both internal information security teams to prevent and detect threats as well as business teams to make risk-informed decisions more effectively.
Position Description/Responsibilities
Experience monitoring publicly available information (PAI) and commercially available intelligence (CAI) and prioritizing signals for action or investigation
Develop and produce detailed intelligence analysis products on cyber threats with a potential impact to McKesson
Present intelligence product and analysis findings to both technical and non-technical audiences
Enable threat hunts and detection engineering with proactive investigative leads and detection use-cases and logic
Directly support active incident response with real-time context during investigations and response
Write clear, succinct, and audience-specific reports and presentations to convey analytic insight
Conduct open-source investigations and develop context in tools (e.g. Virus Total, Silent Push, Maltego, etc.)
Own knowledge management and signal prioritization in the intelligence platform to deliver value via ticket, alert, or dashboard for insight into an IOC, TTP rule, actor behavior, campaign, or trend
Develop and refine playbooks, workflow, and process mapping ensuring proper handoffs across the Detection and Response organization
Critical Requirements
Exceptional interpersonal, organizational, and communication skills and ability to internalize and exemplify Mckesson values
Analytic skills—qualitative and quantitative; creative and curious problem-solving skills
Experience delivering engineering requirements for features, tools, or data improvements.
Knowledge working with data, scripting, normalizing, and automating inputs and outputs (e.g. excel macros, python scripts/notebooks, API integration, SIEM dashboards, BI tools)
Knowledge of tracking actors across the eCrime, nation state, and fraud domains
Experience driving intel innovation forward, from manual (google), semi-automated (RSS), to automated processing (TIP), dissemination (SOAR), and analytics (e.g. SEIM or business intel)
Knowledge of frameworks and how to leverage them to prioritize TTP gaps, actor tracking, and intrusion analysis among others (e.g. MITRE ATT&CK, Diamond Model, Cyber Kill Chain)
Following Qualifications would be advantageous:
10+ years of professional experience in CTI, incident response, threat hunting, or security engineering or detection roles
Bachelor’s degree in computer science, Information Security, Security Engineering, Management Information Systems, Risk Management
The ideal candidate should possess experience in two or more of the following areas, including: Intel analysis, security research, host and network security, pentesting/offensive security, and security automation. Certifications in or courses like the below are competitive:
FOR578: Cyber Threat Intelligence Training
FOR610: Reverse Engineering Malware Training
SEC503: Network Monitoring and Threat Detection In-Depth
SEC560: Enterprise Penetration Testing Course
SEC573: Automating Information Security with Python
OffSec Certified Professional (OSCP) certification
We are proud to offer a competitive compensation package at McKesson as part of our Total Rewards. This is determined by several factors, including performance, experience and skills, equity, regular job market evaluations, and geographical markets. The pay range shown below is aligned with McKesson's pay philosophy, and pay will always be compliant with any applicable regulations. In addition to base pay, other compensation, such as an annual bonus or long-term incentive opportunities may be offered. For more information regarding benefits at McKesson, please click here.
Our Base Pay Range for this position
$139,000 - $231,600McKesson is an Equal Opportunity Employer
McKesson provides equal employment opportunities to applicants and employees and is committed to a diverse and inclusive environment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, age or genetic information. For additional information on McKesson’s full Equal Employment Opportunity policies, visit our Equal Employment Opportunity page.
Join us at McKesson!
Tags: Analytics APIs Automation Business Intelligence Computer Science Cyber Kill Chain Incident response Malware MITRE ATT&CK Monitoring Network security Offensive security OSCP Pentesting Python Reverse engineering Risk management Scripting SIEM SOAR Strategy Threat detection Threat intelligence
Perks/benefits: Competitive pay Equity / stock options Health care Salary bonus
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.