When you join Verizon You want more out of a career. A place to share your ideas freely - even if they're daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love - driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together - lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. Verizon is looking for an innovative and driven leader with insider threat program management experience. This role is responsible for supporting a 24x7x365 geographically dispersed team who detects, analyzes, and responds to suspicious activities and potential insider threats. In this role, you will be responsible for maturing and enhancing our existing insider threat defense capabilities by collaborating on efforts to design and implement improved processes and technologies within Verizon's unique security landscape. You will work closely with key cross-functional stakeholders to develop a program tailored to utilizing proactive and mitigating measures to detect and respond to potential threats to Verizon's infrastructure, employees, and intellectual property. This role is a part of Verizon Cyber Defense's Insider Threat Operations (ITO) team under the Verizon CyberSecurity (VCS). The mission of the ITO team is to protect Verizon by preventing, detecting, and investigating all insider threats by malicious or negligent employees, contractors and vendors with minimal disruption to the line of business. What you'll be doing... Support the day-to-day operations for insider threat investigations by performing insider threat examinations and ensuring the case management and alert development life cycles are followed or adjusted when necessary. Conduct continuous enterprise-wide insider threat monitoring with ability to review end user activity and identify threats from SEIM dashboards and tool consoles. Responsible for accurate and complete investigations and ensuring tasks like case follow up, lessons learned, and case studies are conducted and socialized with appropriate stakeholders. Reacts well under pressure when gathering and conducting in-depth analysis and examination on any supporting evidence or artifacts. Exercise discretion and professionalism when conducting user-based analysis. Follow and maintain documentation, which provide a visual depiction of various insider threat operations workflows to support an innovative program and bolster overall security practices. Ability to effectively prioritize and communicate project statuses accurately and within required timeframes. Assist with the development of global insider threat use cases surrounding data exfiltration, internal fraud, privilege escalations, as well as IT sabotage for desktops, laptops, servers, mobile, virtual and multi-cloud environments. Research industry trends and best practices in order to ensure alerting and case management processes are evolving with the cybersecurity field. Demonstrate strong oral, written and presentation skills with the ability to communicate effectively at all levels of staff and management in high pressure environments. Promote an environment of collaboration and individual accountability when it comes to problem-solving, decision-making, and process improvement. You'll need to have: Bachelor's degree or four or more years of work experience. Four or more years of relevant experience required, demonstrated through work experience and/or military experience. Experience writing and presenting high and low level security reports and briefings for insider threat investigations. Experience with implementation of cybersecurity, network defense, and investigative frameworks (such as NIST CSF, ISO 27000 series, MITRE ATT&CK, Lockheed Martin Cyber Kill Chain, etc.) into network defense processes. Even better if you have one or more of the following: Knowledge of SOC or similar environment methodology, including threat monitoring, intrusion detection, analysis, threat determination, incident handling and remediation tracking. Experience defending against insider threats by leveraging tools like UEBA and DLP. Experience interpreting data from network security tools and infrastructure technologies such as SIEM, firewall, proxies, IPS/IDS devices, full packet capture (FPC), and email platforms. Knowledge of the cyber threat landscape, including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Experience integrating subject profiling and criminal examination best practices into investigative procedures to supplement technical evidence. Understanding of system development life cycle (waterfall & agile) experience. Certifications like: CERT's ITPM, Network+, Security+, CISSP, CFE, and/or Six Sigma Greenbelt or Lean certification. If Verizon and this role sound like a fit for you, we encourage you to apply even if you don't meet every "even better" qualification listed above. Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 37.5 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. To Apply Please forward your CV via the APPLY Now button below.