Cyber Threat Intelligence Analyst III - Network
About the position When you join Verizon, you want more out of a career. A place to share your ideas freely — even if they're daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. Responsibilities • Conduct threat investigations in Verizon's most complex and critical network environments. • Analyze log data to detect active threats within the network using knowledge of the current threat landscape, threat actor techniques, and Verizon's network. • Perform threat research to proactively identify potential threat vectors and work with network and security teams to improve prevention and detection methods. • Leverage Verizon's network telemetry to find indicators of compromise. • Develop expertise on the Verizon threat landscape using threat intelligence, network telemetry, and operational metrics to clearly communicate the threat landscape. • Coordinate with multidisciplinary teams across network organization to iteratively improve security controls and detection capabilities. • Conduct time-sensitive analysis during cyber investigations, including active threat investigation and forensic analysis. • Analyze malicious code, packet capture files, and forensic artifacts. • Identify gaps in logging capabilities and develop and propose strategies to fill gaps. • Identify and propose automated alerts for new and previously unknown threats. • Collaborate with teams across the Cyber organization to mitigate risk by testing, deploying, and developing investigative playbook. Requirements • Bachelor's degree or four or more years of work experience. • Four or more years of relevant experience required, demonstrated through work experience and/or military experience. • Experience with network device logs, netflow, and/or working with large datasets. Nice-to-haves • A degree in engineering or computer science. • Experience with security risk procedures, security patterns, authentication technologies and security attack pathologies. • Good communication skills. • Strong analytical and problem-solving skills. • Experience with incident response, security operations, malware analysis, or threat hunting. • Experience with application of data science concepts and techniques to enable advanced threat detection. • Working knowledge of Splunk and Elastic Search. Apply tot his job