Poznan Pastelowa
As an Insider Threat Analyst, you will work closely with the Director of Insider Threat Strategy and Governance to deter, detect, and respond to threats to GSK’s intellectual property and confidential business information. This individual serves as the first line of defense against accidental and malicious threats.
The Insider Threat Analyst will review and analyze potential indications of insider threats and escalate alerts via escalation pathways. The analyst will recommend strategies to further build detection capabilities. The Insider Threat program is part of the Cyber Defense Team, which works within the greater Cyber Security Office at GSK.
Key Responsibilities:
- Conduct tactical analysis of information streams to detect potential indications of insider threats for referral to appropriate investigators.
- Work with the Director of Insider Threat Strategy and Governance to develop strategies to deter, detect, and respond to threats against GSK’s Intellectual Property and confidential business information.
- Identify new streams of information to detect insider threats. Develop and implement effective and efficient workflows to review the information.
- Conduct or support risk assessments of sensitive company programs as needed.
- Conduct open-source research about industry trends and developments in protecting IP and countering Insider Threats.
- Work with other stakeholders in Legal, HR, Cyber Security, Corporate Security, Internal Audit, etc. to develop and implement policies to protect Intellectual Property and confidential business information.
- Conduct statistical analysis of insider events to identify patterns and develop mitigation strategies to respond to this information.
- Prepare briefings to stake holders about insider events and trends.
- Craft and deliver awareness training on the protection of sensitive information as needed.
- Prepare timely written reports which summarize significant industry insider events to draw lessons which can be incorporated into GSK’s overall program.
Why You?
Basic Qualifications:
- 3+ years’ experience from any of the following fields: insider threat; law enforcement; intelligence (collection, targeting, or analysis); counter-intelligence; corporate security; investigations
- Experience with open source research
- Experience with Microsoft Office Suite, including Share Point, One Drive, Power Point, Excel
Preferred Qualifications:
- Experience with Data Loss Prevention (DLP) and User Entity and Behavior Analytics (UEBA) platforms
- CERT Insider Threat Program Manager (ITPM)
- CISSP
- Comp Tia Security+
- Global Counter Insider Threat Professional (GCITP)
- GIAC Certified Incident Handler
- Ability to synthesize data from multiple streams of information and collection platforms to identify potential threats to sensitive company information
- Excellent written and oral communication skills
- Ability to work in an ambiguous, flexible, fast paced, environment and succeed as a selfstarter and individual contributor
- Works well in a team environment, where team members are dispersed
- The highest level of integrity and honesty and the ability to protect sensitive confidential information.