What are the responsibilities and job description for the Principal Threat Analyst position at Fortra?
The Principal Threat Analyst will play a pivotal role in driving the strategic direction of Fortra’s Managed Cybersecurity Services. This role requires a seasoned professional with a deep understanding of, and direct hands-on experience with cybersecurity threats. The Principal Threat Analyst will collaborate effectively with cross-functional teams, including Product Management, Strategy, and Development and be a critical part of our scale and evolution. The Principal Threat Analyst will lead critical initiatives to enhance our security capabilities, focusing on security event detection and analysis, threat hunting, and the integration of automation and data science to scale and evolve operations.
WHAT YOU'LL DO
- Strategic Leadership: Develop and drive the strategic initiatives for the SOC, ensuring alignment with organizational goals and industry best practices.
- Threat Landscape: Monitor the threat landscape and leverage this information to ensure Fortra Managed Services is ahead the curve in terms of detection and response capabilities.
- Cross-Functional Collaboration: Partner with Product Management, Strategy, and Development teams to integrate security considerations into product and business strategies. Liaise between Product/R&D and Operations to drive effective requirements into the design process for key projects and initiatives.
- Threat Analysis and Hunting: Design and develop advanced threat analysis and threat hunting processes to identify, analyze, and mitigate security threats at scale within customer environments.
- Innovation and Automation: Drive innovation within security operations by leveraging automation and data science to enhance efficiency and effectiveness.
- Capability Development: Lead initiatives to evolve SOC capabilities, including the development and implementation of new workflows and processes that improve customer security outcomes and posture.
- Incident Response: Design and develop Incident response playbooks to be used by SOC team members in support of customers.
- Hands-on-keyboard experience: Develop proofs-of-concept through code and/or other avenues to demonstrate ideas and value proposition, and then work to refine and create requirements for productionizing successful ideas.
- Reporting and Metrics: Develop key metrics to measure the effectiveness of security operations and communicate findings to senior leadership.
QUALIFICATIONS
- Education: Masters degree in Computer Science, Information Security, or a related field. Advanced degree preferred.
- Experience: Minimum of 10-12 years of experience in cybersecurity, with a focus on threat analysis, incident response, and security operations.
- Technical Skills: Proficiency in security tools and technologies, including MDR/XDR, SIEM, EDR, and threat intelligence platforms. Strong understanding of automation and data science applications in security.
- Leadership Skills: Proven ability to lead and inspire teams, manage complex projects, and drive strategic initiatives.
- Communication Skills: Excellent verbal and written communication skills, with the ability to convey complex security concepts to both technical and non-technical audiences.
- Certifications: Relevant certifications such as CISSP, CISM, or GIAC are highly desirable.
- Hands-on-keyboard experience: Develop proofs-of-concept through code and/or other avenues to demonstrate ideas and value proposition, and then work to refine and create requirements for productionizing successful ideas.