×
Register Here to Apply for Jobs or Post Jobs. X

Brand and Exposure Management Analyst

Remote / Online - Candidates ideally in
Portsmouth, Rockingham County, New Hampshire, 00215, USA
Listing for: TOPPAN Edge Inc.
Remote/Work from Home position
Listed on 2026-01-20
Job specializations:
  • IT/Tech
    Cybersecurity, Data Security
Job Description & How to Apply Below

Why Choose Bottomline?

Are you ready to transform the way businesses pay and get paid? Bottomline is a global leader in business payments and cash management, with over 35 years of experience and moving more than $16 trillion in payments annually. We're looking for passionate individuals to join our team and help drive impactful results for our customers. If you're dedicated to delighting customers and promoting growth and innovation - we want you on our team!

Location: This role is Remote based;
Candidates can be located in the US or EU markets.

The Role

The Brand Security and Exposure Management Analyst is a business-focused cyber monitoring role responsible for protecting the organization's brand reputation, customer trust, and corporate identity across digital channels. This position bridges cybersecurity awareness with business risk management, focusing on the detection and response to brand abuse, impersonation schemes, data exposure incidents, and supply chain compromises that could impact customer confidence or organizational reputation.

The successful candidate will coordinate cross-functional responses involving fraud, legal, privacy, and customer service teams while providing supplemental support to security operations during scheduled shifts. This role emphasizes business acumen, stakeholder communication, and practical risk mitigation over deep technical analysis.

How you’ll contribute Brand Protection and Reputation Monitoring
  • Lead the development and implementation of brand monitoring capabilities within Security Operations, establishing processes for detecting and responding to brand abuse across digital channels
  • Monitor online sources including social media, mobile app stores, domain registrations, and underground forums for unauthorized use of corporate trademarks, executive impersonation, and fraudulent schemes targeting customers
  • Identify phishing campaigns, fake websites, counterfeit mobile applications, and social engineering attacks that exploit the organization’s brand to defraud customers or damage reputation
  • Track discussions and activities on underground platforms where stolen customer data, compromised credentials, or payment card information may be traded or disclosed
  • Assess the business impact and reputational risk of brand abuse incidents, prioritizing response activities based on potential customer harm and operational disruption
Exposure Response and Cross-Functional Coordination
  • Coordinate takedown and remediation efforts for fraudulent domains, fake social media accounts, counterfeit applications, and phishing infrastructure impersonating the organization
  • Partner with Legal counsel to facilitate cease and desist actions, intellectual property enforcement, and appropriate escalation to law enforcement when criminal activity is identified
  • Collaborate with Fraud teams to understand emerging fraud patterns, share intelligence on threat actor tactics, and support investigations of customer-impacting incidents
  • Work with Privacy officers to ensure appropriate handling of customer data exposure incidents, including breach notification assessments and regulatory reporting requirements
  • Support customer-facing teams by providing timely intelligence on active threats, recommended customer communications, and guidance on responding to customer inquiries about suspicious activity
  • Maintain documentation of brand abuse cases, response timelines, and resolution outcomes to demonstrate program value and inform process improvements
Supply Chain Exposure and Vendor Incident Coordination
  • Monitor public disclosures and intelligence sources for security incidents, data breaches, and compromises affecting third-party vendors and technology partners
  • Assess potential business impact when supply chain partners experience security incidents, including risks to customer data, operational continuity, and regulatory compliance
  • Coordinate with internal stakeholders to determine appropriate response actions when vendor compromises are identified, including contract reviews, audit requests, or service migration planning
  • Support vendor risk management activities by providing external intelligence on supplier…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary