Cyber Security Insider Threat Analyst Professional

Headquarters 2, United States

Freddie Mac

We are supporting America's homeowners and renters while serving as a stabilizing force in the U.S. housing finance system.

View all jobs at Freddie Mac

Apply now Apply later

At Freddie Mac, our mission of Making Home Possible is what motivates us, and it’s at the core of everything we do. Since our charter in 1970, we have made home possible for more than 90 million families across the country. Join an organization where your work contributes to a greater purpose.

Position Overview:

Do you have a passion for analyzing threats and experience in collecting and analyzing insider threat behavior to determine response and mitigation? If you have proven skills and experience in the world of insider threat or cyber threat intelligence, apply now and learn why there’s #MoreAtFreddieMac!

Our Impact:

The Insider Threat team is responsible for keeping Freddie Mac protected from internal risks thereby enabling the organization to conduct business in a secure environment through a variety of engagements, including:

  • Insider threat and threat intelligence
  • Monitoring of employee behavioral patterns
  • Detecting and responding to security events
  • Response and investigation of insider threat
  • Governance, reporting, and team/process optimization

As an Insider Threat Analyst, you will be part of Cyber Security Operations & Intelligence at Freddie Mac and will help carry the Information Security department’s vision of reducing information risk by ensuring and enhancing the confidentiality, integrity and availability of information. This position report to the Insider Threat Program Manager.

Insider Threat Analysts are responsible for conducting analysis, providing assessment of suspected insider threat activity, among a variety of other duties related to these broad responsibilities.

The Cyber Insider Threat Team provides both direct and indirect support of enterprise security needs and requirements and produces:

  • Insider Threat Analysts are responsible for conducting analysis, providing assessment of suspected insider threat activity, among a variety of other duties related to these broad responsibilities.
  • The Cyber Insider Threat Team provides both direct and indirect support of enterprise security needs and requirements and produces:
    • Tactical internal threat assessments in support of Freddie Mac’s Cyber Information Security efforts
    • Monitoring and analysis of potential insider threat activity and making informed decisions on escalating threat activity for further review.
    • Data analytics - extract raw data to observe concerned behavior and activity of potential insiders, combine and correlate data from multiple sources to observe any anomaly in employee behavior; create and implement detection methods and strategies for insider threats and use advanced analytics to identify any irregular patterns in insider activities.
    • Create and update scripts using python to help build data correlations from multiple data sources and design automated risk scoring for profile; leverage these for behavioral baselining and analytics
    • Generative Artificial Intelligence (GenAI) – leverage GenAI to build better detections, leverage machine learning (ML) and large language models (LLMs) to create behavioral baselines that would trigger alerts for anomalous behavior
    • Recommendations - make a recommendation on Freddie Mac’s security posture based on the outcome of insider threat investigation.

Your Impact:

  • Use your analytical problem-solving skills to identify trends and patterns in data that indicate a potential or existing insider threat event
  • Use your programming skills to write scripts that can correlate data from multiple sources to build behavioral analytics and patterns
  • Understand and apply risk scoring and threat analysis tools to improve the Freddie Mac security posture
  • Leverage your experience with User and Entity Behavior Analytics (UEBA), Data Loss Prevention (DLP) security controls, and SIEM tools to properly detect, categorize, and document threat events
  • Monitor various sources for insider threat activity on a continuous basis, including commercial and Opensource tools to quickly analyze, detect, and mitigate potential cyber security incidents
  • Analyze internal threat intelligence and security related activities for the development of cyber threat summaries including risks to the institution and specific actions for the institution to consider
  • Communicate and collaborate effectively with various lines of business, trusted parties, individual contributors and management
  • Create structured and ad-hoc communications appropriate to different audiences on both technical and non-technical topics
  • Develop comprehensive security write-ups which describe security issues, analysis, and remediation techniques to senior management
  • Develop internal documentation, such as detailed procedures, playbooks, and operational metrics reports as required
  • Execute daily ad-hoc tasks or lead small projects as needed

Qualifications

  • 2-5 years related experience in Cyber Security, Insider Threat, Intelligence Community, Federal Law Enforcement, or a related field
  • Bachelor’s Degree (STEM, Humanities, IT) OR 5 years of a related discipline or an equivalent combination of education and work experience
  • Demonstrable understanding of computer networking concepts, communication protocols, primary threat actor attack methods and tools
  • Skilled in collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources, documenting results and analyzing findings to provide advanced threat intelligence
  • Demonstrable experience integrating ML algorithms into cyber tech stack to enable automated threat detection, classification and response.
  • Demonstrable experience using Splunk to build data correlations and detections
  • Demonstratable skills in python programming and/or powershell scripting
  • Solid understanding of GenAI usage in the business place and the ability to detect GenAI misuse
  • Ability to understand and learn technical specifications, system requirements and other application design information as needed
  • Ability to use commercial and Opensource tools to quickly analyze, detect, and respond to cyber security events or incidents
  • Ability to effectively collaborate with diverse teams
  • Excellent analytical skills and strong attention to detail
  • Strong written communication skills including experience with reports and presentations for executive audiences
  • Relevant information security certification (e.g. CISSP, CEH, GSOM, etc.) is preferred but not required
  • Financial services experience is a plus

Key to success in this role

  • Intellectual agility and interpersonal flexibility
  • Ability to maintain confidentiality and integrity of cases and findings
  • Strong consultation and communication skills
  • Ability to work with and collaborate across the team and where silos exist
  • Ability to cultivate and develop mutually beneficial relationships inside and outside of the IT division
  • Deep curiosity to learn about emerging trends and how to do things better and share learnings with team members
  • Ability to use data to help inform strategy and direction

Current Freddie Mac employees please apply through the internal career site.

We consider all applicants for all positions without regard to gender, race, color, religion, national origin, age, marital status, veteran status, sexual orientation, gender identity/expression, physical and mental disability, pregnancy, ethnicity, genetic information or any other protected categories under applicable federal, state or local laws. We will ensure that individuals are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.

A safe and secure environment is critical to Freddie Mac’s business. This includes employee commitment to our acceptable use policy, applying a vigilance-first approach to work, supporting regulatory mandates, and using best practices to protect Freddie Mac from potential threats and risk. Employees exercise this responsibility by executing against policies and procedures and adhering to privacy & security obligations as required via training programs.

CA Applicants:  Qualified applications with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act.

Notice to External Search Firms: Freddie Mac partners with BountyJobs for contingency search business through outside firms. Resumes received outside the BountyJobs system will be considered unsolicited and Freddie Mac will not be obligated to pay a placement fee. If interested in learning more, please visit www.BountyJobs.com and register with our referral code: MAC.

Time-type:Full time

FLSA Status:Non-Exempt

Freddie Mac offers a comprehensive total rewards package to include competitive compensation and market-leading benefit programs. Information on these benefit programs is available on our Careers site.

This position has an annualized market-based salary range of $88,000 - $132,000 and is eligible to participate in the annual incentive program. The final salary offered will generally fall within this range and is dependent on various factors including but not limited to the responsibilities of the position, experience, skill set, internal pay equity and other relevant qualifications of the applicant.
Apply now Apply later
Job stats:  3  0  0
Category: Analyst Jobs

Tags: Classification Data Analytics Generative AI LLMs Machine Learning Privacy Python Security Splunk STEM

Perks/benefits: Career development Competitive pay Equity / stock options Team events

Region: North America
Country: United States

More jobs like this