×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Principal Cyber Threat Intelligence Analyst

Job in Ashburn, Loudoun County, Virginia, 22011, USA
Listing for: Verizon
Full Time position
Listed on 2026-03-05
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below
When you join Verizon

You want more out of a career. A place to share your ideas freely - even if they're daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love - driving innovation, creativity, and impact in the world.

Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together - lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife.

What you'll be doing...

The Network Security Threat Intelligence team is responsible for proactive detection and investigation of threat actor activity within the Verizon network. As a Principal Analyst and technical leader, you will apply all source intelligence to identify threat activity and work with network and security teams to improve detection capabilities and security controls.

You will be responsible for collecting and interpreting threat information, providing detailed information for the investigation and detection of threats. Furthermore, you will drive technical milestones, mentor the team, and to continuously grow in technical skill set in this area.

Responsibilities:

  • Incident Response & Investigation:

    • Conduct time-sensitive analysis during cyber investigations, including active threat investigation and forensic analysis.

    • Conduct threat investigations in the most complex and critical network environments, acting as an escalation point for issues.

    • Analyze malicious code, packet capture files, and forensic artifacts.

  • Advanced Data & Network Analysis:

    • Analyze log data to detect active threats within the network using knowledge of the current threat landscape, threat actor techniques, and the network.

    • Leverage network telemetry to find indicators of compromise, utilizing expert knowledge of Netflow and BGP data.

  • Threat Intelligence & Strategy:

    • Perform threat research from partner intelligence to identify potential threat vectors and work with network and security teams to improve prevention and detection methods.

    • Develop expertise on the threat landscape using threat intelligence, network telemetry, and operational metrics to clearly communicate the threat landscape to leadership.

  • Detection Engineering & Leadership:

    • Identify gaps in logging capabilities and develop and propose strategies to fill gaps.

    • Identify and propose automated alerts for new and previously unknown threats.

    • Collaborate with teams across the Cyber organization to mitigate risk by testing, deploying, and developing investigative playbooks.

You'll need to have...

  • Bachelor's degree or four or more years of work experience.

  • Six or more years of relevant experience required, demonstrated through one or a combination of work and/or military experience, or specialized training.

  • 5+ years of experience in cybersecurity or information technology.

  • Extensive experience conducting cybersecurity investigations.

  • Splunk Expertise:
    Advanced proficiency in using Splunk for data mining, dashboarding, and alert creation.

  • Network Analysis:
    Deep understanding of Netflow, network device logs, and working with large datasets.

  • Incident Response Analysis:
    Deep understanding of network, endpoint and log analysis and reporting post security incidents.

  • Strong analytical and problem-solving skills with the ability to think critically and identify risks.

Even better if you have one or more of the following:

  • 5+ years of experience with incident response, security operations, malware analysis, threat hunting, or intelligence operations.

  • Experience with long term intelligence gathering projects providing information to joint intelligence initiatives.

  • Experience with NIST SP 800-61 or SANS PICERL framework and their application.

  • Working knowledge of SIEM/SOAR products.

  • Working knowledge with Threat Intelligence Platforms.

    If Verizon and this role sound like a fit for you, we encourage you to apply even if you don't meet every "even better" qualification listed above.

Where you'll be working In this hybrid role, you'll have a defined work location that…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary