×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Principal Cybersecurity - Network Threat Analyst

Job in Middletown, Monmouth County, New Jersey, 07748, USA
Listing for: AT&T
Full Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below

Job Description: This position requires office presence of a minimum of 5 days per week and is only located in the location(s) posted. No relocation is offered.

Join AT&T and reimagine the communications and technologies that connect the world. Our Chief Security Office ensures that our assets are safeguarded through truthful transparency, enforce accountability and master cybersecurity to stay ahead of threats. Bring your bold ideas and fearless risk-taking to redefine connectivity and transform how the world shares stories and experiences that matter. When you step into a career with AT&T, you won’t just imagine the future—you’ll create it.

The Principal Cybersecurity Network Threat Analyst investigates and researches cyber threats using network analysis tools and techniques. The Network Threat Analyst derives actionable threat intelligence and provides analytical support to the Chief Security Office Cyber Operations organization.

The Network Threat Analyst will:

  • Perform deep technical analysis of suspicious network activity using internal network collection platforms, including but not limited to flow analysis, packet analysis, review of metadata and intelligence sources.
  • Use proprietary and open-source intelligence sources to analyze and interpret network telemetry, produce informative products, briefs, reports, and indicators of compromise.
  • Configure and optimize internal and external threat monitoring systems to increase AT&T's intelligence holdings to maintain a high standard of quality for network cyber indicators.
  • Document findings and recommend remediation action to a team of highly technical professionals with expertise in cybersecurity, threat intelligence, threat detection, networking, log, malware, and vulnerability analysis.
  • Identify and implement new analysis techniques, beyond those currently available.
  • Detect network threats beyond the capabilities of common tools.
  • Reduce the risk of False Positive or False Negative detections and improve detection logic for advanced and targeted threats that are missed by existing tools and controls.
  • Implement new automation solutions to improve workflow efficiency.
  • Create detailed and accurate reports and professional briefings documenting findings to share with a variety of audiences.
  • Recommend and oversee implementation of technical requirements to ensure platform meets analysis needs.

Demonstrated Knowledge or use of:

  • Common cybersecurity concepts, tools, and frameworks (e.g., NIST, MITRE ATT&CK, SIEM, IDS/IPS, etc.)
  • Common network threats, attack methods and techniques (DDoS, brute force, spoofing, MITM, etc.)
  • Common network concepts, technologies, controls, and protocols (e.g., IDS/IPS/Routing/VPN/ICMP/BGP/UDP/TCP/SSL/HTTP/SMTP, etc.)
  • Cyber-attack stages (e.g., reconnaissance, scanning, enumeration, exploitation, privilege escalation, lateral movement, persistence, etc.)
  • Network analysis tools/technologies (Wireshark, Netwitness, SNORT, SURICATA, ZEEK, PCAP, NETFLOW, etc.)
  • Programming or scripting languages (e.g., Python, Power Shell, or equivalent)
  • Investigative tools and techniques.

Demonstrated ability to:

  • Identify network threats and create detective measures and IOCs.
  • Identify patterns and trends in data with strong analytical and problem‑solving skills.
  • Identify False Positives and False Negatives.
  • Use and configure threat intelligence platforms and tools (e.g., MISP, Threat

    Q, OpenCTI or equivalent).
  • Stay current with the latest developments in cybersecurity and threat intelligence.
  • Work independently and collaboratively in a fast‑paced & dynamic environment.
  • Use Windows and Linux.
  • Use Open‑Source Research Techniques to discover related threats.
  • Adhere to established rules, regulations, conventions, and information protection requirements with a demonstrated sense of responsibility and ethics.
  • Apply feedback to future work products.
  • Effectively communicate to convey complex information in a clear and concise manner in both written and oral formats.

Education/

Experience:

Bachelor’s degree (BS/BA) desired in Computer Science or Cybersecurity. 7+ years of related experience. Certification is required in some areas.

Desired:

  • Relevant cybersecurity certifications…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary