Cyber Insider Threat Analyst

Cyber Insider Threat Analysts analyze information and intelligence and develop research studies and recommendations pertaining to potential security threats originating from within an organization.

Role overview

Insider Threat Analysts are responsible for collecting and assessing potential threats from within an organization, whether they’re from employees, business partners, or third-party vendors. They analyze these threats, identifying trends and patterns in threat data and finding any policy violations before disseminating and presenting their findings to key stakeholders.

Cyber Insider Threat Analysts
may also be referred to as:
Counter Insider Threat Analyst
Cyber Insider Threat Analyst
Cyber Insider Threat Investigator
Insider Threat Advisor
Insider Threat Analyst
Insider Threat Specialist

Career Path

Map your career path by understanding role relationships

Average Salary

Based upon experience, salary for this role ranges from:
$85,000
National Average
$100,833
$116,667

Responsibilities

Documenting procedures, practices, and policies that need to be in place to begin threat analysis.
Carrying out surveys and interviewing key personnel regarding security procedures and identifying possible gaps in security.
Extracting data to observe the behavior and activity of potential inside threats.
Combining data from multiple sources to observe any anomaly in employee behavior.
Creating and implementing detection methods and strategies for insider threats.
Conducting risk assessments on collected data and establishing systems that extract data to monitor suspicious activity.
Taking immediate action on any activity that looks to have malicious intent.
Making recommendations on existing procedures and policy layers.

Tools & Environment

Cyber Insider Threat Analysts are often familiar with risk scoring and threat analysis tools, user and entity behavior analytics, Data Loss Prevention (DLP) security controls, and SIEM tools. These professionals also need a deep understanding of the security tools used by the organization, including firewalls, antivirus solutions, and threat intelligence systems.

Certifications

[cyber_job_role_count] Cyber Insider Threat Analyst jobs

Resources

Videos

Watch our latest videos, talks an recorded events
Watch

White Papers

Download our whitepapers and printed resources
Learn

Free Courses

Browse our training courses and educational resources
See All

Podcasts

Listen to our podcast features and recorded roundtables
Listen

The CyberSN™ Provider Exchange

The training courses, services, products, and DEI providers you need to take control and accelerate your success.

YOU COULD BE HERE

Get in touch to see your product, training course, service, or DEI support on our provider exchange.
CYBER BUYER

Cyber Security Cloud & SaaS Solutions Outfitter

Invest in Turbo Charging Cyber Security Solutions – Faster Incident Detection, Response and Recovery Times – Get Access To Over 100 New and Emerging Cloud and Cyber Security Software Solutions
Vertex11

Cybersecurity, Risk Management, Continuity of Operations, and Data Protection & Governance

You need expertise to help you manage risk and protect your data from cyber attacks. Whether it’s strategy, cloud security, compliance, or anything in between, Vertex11 is your ultimate resource for getting the job done.
ESCALATE | Point3 Security

Identify Highly Skilled Individuals with ESCALATE Talent Screening

Traditional hiring has a couple of flaws. Human biases prevent good hires. Over-reliance on certifications and years of experience & HR Software and AI often removes top performers. With ESCALATE Talent Screening, your candidates physically demonstrate necessary skills, informing your hiring process far beyond certs or years of experience.
Rapid Ascent, Inc

Ascend with a Career in Cybersecurity

Hands-on, on-the-job training using state-of-the-art AI, gamified live-fire threats with real-world projects, and coaching from industry experts.
CYRISMA

A Cybersecurity SaaS Ecosystem

CYRISMA combines Data Discovery/Data Loss Prevention, Vulnerability Scanning, Configuration Hardening, Score Card Evaluation, Various Reporting and Mitigation planning and Mitigation Execution in a single web-based platform generating Monthly Recurring Revenue for the MSSP.

Get our latest insights. Subscribe to our newsletter.