CrawlJobs Logo

Global Response Operations - Detection Analyst

meta.com Logo

Meta

Location Icon

Location:
United States , Menlo Park

Category Icon

Job Type Icon

Contract Type:
Employment contract

Salary Icon

Salary:

185220.00 - 207900.00 USD / Year

Job Description:

Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps and services like Messenger, Instagram, and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. To apply, click "Apply to Job" online on this web page.

Job Responsibility:

  • Drive the scoping and development of risk signals for key problem areas
  • Identify emerging risks using on-platform and off platform signals, through monitoring and analysis
  • Conduct investigations to develop rigorous understanding and knowledge of potential emerging trends and evolving risks in priority areas
  • Work cross-functionally to drive mitigation for identified risk areas, including conducting enforcement on violating trends
  • Build and execute risk detection strategies to support the management of critical events, such as elections and crises
  • Use data and internal tools to identify and investigate potential risk areas and patterns at scale and across abuse types
  • Use quantitative and qualitative research methods to perform root cause analyses on investigative findings or high priority escalations
  • Partner with internal experts to build a rigorous understanding of how, where, and why broad forms of abuse are experienced across the platform
  • Synthesis investigative findings through the creation of analysis and presentations that provide a succinct, coherent narrative assessing risk
  • Influence and support innovation of technology, as well as adoption of technical solutions, that improves our detection capabilities (efficiency, speed, and reduction on language dependence)
  • International travel required up to 10%

Requirements:

  • Requires a Bachelor’s degree (or foreign equivalent) in Computer Science, Data Science, Engineering, Information Systems, Statistics, Mathematics, Cybersecurity, or related field, and 4 years of experience in the job offered or related occupation
  • Requires 4 years of experience in the following: Investigations, data analytics, or technical systems roles focused on Trust & Safety or Risk Operations within online platforms such as social media, digital advertising, eCommerce, or online payments
  • Managing escalation workflows, including assessing, prioritizing, and resolving high-impact or time-sensitive events, such as election, crises, high severity abuse
  • Developing or implementing detection pipelines and risk-signal systems that leverage on-platform data to identify, analyze, or mitigate abusive or fraudulent activity
  • Communicating progress and results to technical and non-technical audiences
  • Using SQL for large-scale dataset analysis
  • Using Python for data extraction, automation, or analytics
  • Working with graphic or objectionable content and adhere to sensitive-content handling procedures
What we offer:
  • bonus
  • equity
  • benefits

Additional Information:

Job Posted:
April 23, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Global Response Operations - Detection Analyst

Global Safety Response Operations Analyst

We’re looking for experience Trust, Safety, and Risk Operations analysts who hav...
Location
Location
United States , San Francisco
Salary
Salary:
189000.00 - 280000.00 USD / Year
openai.com Logo
OpenAI
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in trust & safety, content moderation, investigations, fraud, or developer risk operations
  • Experience working in incident response, law enforcement response, or escalations management
  • Deep domain expertise in specialization area and familiarity with relevant legal, policy, and technical frameworks
  • Track record of scaling operations, building processes, and working cross-functionally to improve performance and safety outcomes
  • Exceptional analytical skills able to detect patterns, assess risk, and recommend policy or product changes based on evidence
  • Communicate with clarity, empathy, and precision especially in sensitive user-facing contexts
  • Thrive in ambiguous, high-autonomy environments and balance speed with diligence
  • Comfortable with frequent context switching, managing multiple projects, and prioritizing impact
Job Responsibility
Job Responsibility
  • Handle and resolve high-priority cases across all harm and risk areas, ensuring timely and appropriate resolution in line with policy and legal requirements
  • Operate across multiple systems and tools to manage user reports and tickets, internal escalations, and other high priority investigations
  • Act as incident manager for escalations requiring nuanced policy, legal, or regulatory interpretation
  • Identify and implement process improvements and automation opportunities to increase efficiency, accuracy, and coverage
  • Conduct quality reviews and provide feedback to improve consistency across global teams
  • Analyze trends and generate insights from escalation and case data to inform policy, product, model behavior, or detection improvements
  • Maintain exceptional accuracy, judgment, and composure under pressure when handling sensitive or time-critical situations
  • Participate in 24/7 on-call rotation, including off-hours and weekend coverage as needed
What we offer
What we offer
  • Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts
  • Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)
  • 401(k) retirement plan with employer match
  • Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)
  • Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees
  • 13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)
  • Mental health and wellness support
  • Employer-paid basic life and disability coverage
  • Annual learning and development stipend to fuel your professional growth
  • Daily meals in our offices, and meal delivery credits as eligible
  • Fulltime
Read More
Arrow Right

Senior Manager, Maritime Cyber Safety Operations

The Senior Manager, Maritime Cyber Safety Operations is responsible for leading ...
Location
Location
United States , Miami
Salary
Salary:
Not provided
carnival.com Logo
Carnival Cruises
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, Information Security, Business Informatics, Business administration
  • Minimum 3+ Years leading an IT/Cybersecurity Operations Environment
  • Desired to have one of or more of the following certificates: CISSP, GSLC, GSOC, GCTI, or CISM
  • Expertise in OT Cyber Operations Management, OT Network Design Concepts, and OT System Architecture Design Principles
  • Knowledge of maritime communication systems, bridge systems, propulsion and machinery management systems, power control systems, access control systems, and cargo management systems being a plus
  • Advanced problem-solving capabilities
  • Strong leadership to manage and mentor a global team
  • 24/7 cybersecurity operations mindset
  • Ability to guide cross-functional teams
  • Subject matter expert (SME) capabilities
Job Responsibility
Job Responsibility
  • Implement and operate OT security monitoring, incident response, and threat detection for all OT cyber safety tools delivered across the global fleet
  • Establish and maintain SLAs that align with GCS Threat and Intel Operations metrics to measure KRIs and KPIs for OT cyber operations
  • Establish and manage a global service delivery model to monitor, respond to, and mitigate OT cybersecurity threats aligned with the NIST framework
  • Manage OT security operational processes, including stakeholder management, to ensure effective OT cyber safety alert resolution
  • Build and or maintain a comprehensive inventory of critical OT assets and ensure accurate risk ranking and vulnerability alerting against each asset
  • Develop and maintain effective support process for OT Cyber safety defense tools such as remote access, backup and recovery, removeable media scanners, anti-virus, patching, etc
  • Build, develop, and lead a global team of OT security analysts to maintain a high standard of operational support
  • Act as an escalation point for critical OT cybersecurity incidents, ensuring swift mitigation and communication with stakeholders
  • Maintain knowledge of and implement operational standards in line with industry regulations and guidelines (e.g., CLIA, BIMCO, IMO, MSC-FAL.1/Circ.3)
  • Provide strategic guidance to senior leadership and key stakeholders
What we offer
What we offer
  • Cost-effective medical, dental and vision plans
  • Employee Assistance Program and other mental health resources
  • Company paid term life insurance and disability coverage
  • 401(k) plan that includes a company match
  • Employee Stock Purchase plan
  • Paid Time Off
  • Holidays
  • Vacation Time
  • Sick Time
  • Complementary stand-by cruises, employee discounts on confirmed cruises, plus special rates for family and friends
  • Fulltime
Read More
Arrow Right
New

Security Operations Analyst

We are seeking someone with a passion for cyber security to join our team. As a ...
Location
Location
United States
Salary
Salary:
81500.00 - 110300.00 USD / Year
rapid7.com Logo
Rapid7
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 1-3 years of experience within cyber security operations
  • Strong problem-solving ability, critical thinking skills, and ingenuity
  • A passion for cybersecurity, coupled with a keen curiosity and eagerness to learn
  • Required familiarity with MacOS, Windows, and/or Linux operating systems
  • Essential experience using Security Information and Event Management (SIEM) tools, such as the Rapid7 command platform or Splunk, or comparable platforms
  • Experience in common Security Operations Center (SOC) functions, including but not limited to, incident response, threat hunting, detection engineering, malware analysis, or forensic investigations (network and endpoint)
  • The aptitude to identify areas for process improvement and successfully implement solutions
Job Responsibility
Job Responsibility
  • Contribute to a global Security Operations team
  • Provide high-quality threat detection services
  • Lead or support incident response investigations for Rapid7
  • Help document and implement knowledge of current attack methodologies
  • Conduct research to enhance threat detection capabilities and reinforce brand reputation
  • Offer ongoing feedback to Rapid7's product development teams
Read More
Arrow Right

Cybersecurity Manager - Detection and Response

Microsoft Incident Response – the Detection and Response Team (DART) – part of t...
Location
Location
United Kingdom , Multiple Locations
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field
  • OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field and several years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection and several years of experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field and several years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection OR equivalent experience
  • Many years of people management and/or informal/indirect team leadership experience
  • Strong analytic, qualitative, and quantitative reasoning skills
  • Track record of successfully managing a technical business group and maintaining consistent growth
  • Recognized as a strategic leader who can hire, retain and motivate diverse quality talent
  • Experience leading both a services organization and product development function
  • Develop business strategy and provide technical thought leadership
  • Manage customer engagements escalations to ensure customer satisfaction
Job Responsibility
Job Responsibility
  • People Management: Responsible for mentoring, managing and leading a team of cyber security analysts, engineers, developers, leads and incident managers
  • Managers deliver success through empowerment and accountability by modeling, coaching, and caring
  • Strategic Initiatives: Secure partner relationships and work closely with internal product and services groups as well as co-delivering with Microsoft’s Partner ecosystem
  • Develop and mentor individual contributors through open communication, training and development opportunities and performance management processes
  • Develop and maintain objectives, metrics and KPIs supporting the department’s strategic direction and continuously improve incident response technical capabilities
  • Communicate complex and technical issues to diverse audiences, verbally and in writing, in an easily understood, authoritative, and actionable manner
  • Present to a wide range and size of audiences from IT Pro, to CxO, to business decision makers
  • Technical leadership and executive presence to establish Trusted Technical Advisor to influence senior decision makers to mature and promote customer’s security posture across the overall technology landscape
  • Drive investigative teams to exhaust all investigative leads in the expectation of discovering novel attacker techniques
  • Investigate and research these techniques, and partner with threat intelligence and security engineering to drive security tooling and product enhancements
  • Fulltime
Read More
Arrow Right

Lead Threat Intelligence Analyst

We are looking for a Lead Threat Intelligence Analyst. In this role, you'll be a...
Location
Location
Canada , Toronto
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5-7 years of experience in cybersecurity
  • Minimum of 3 years in a dedicated threat intelligence role
  • Strong understanding of the cyber threat landscape, including knowledge of threat actor groups, common attack vectors, and malware families
  • Proven ability to analyze complex data from various sources
  • Familiarity with common threat intelligence frameworks like MITRE ATT&CK, the Cyber Kill Chain, and Diamond Model
  • Excellent written and verbal communication skills
  • Experience with threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and forensic tools
Job Responsibility
Job Responsibility
  • Lead the design, development, and continuous improvement of the organization’s cyber threat intelligence (CTI) program
  • Perform deep-dives into cyber threats, including analyzing malware, understanding adversary tactics, techniques, and procedures (TTPs), and tracking threat actor groups
  • Create and refine threat models and frameworks to predict and prepare for potential attacks
  • Work with our Global Security Operations Center (GSOC), Detection Engineering, Automation Engineers and Incident Response teams to integrate threat intelligence into our detection and prevention systems
  • Generate timely and high-quality intelligence/Threat Landscape reports, risk forecasts and alerts for technical and executive audiences
  • Promote automation of indicator ingestion, correlation, and dissemination across GSOC, Automation and IR platforms
  • Define and track key performance indicators (KPIs) for the threat intelligence program
  • Conduct periodic maturity assessments of the threat intelligence function
  • Provide guidance and mentorship to junior analysts
What we offer
What we offer
  • Medical (HSA & FSA), dental, vision
  • 401(k) with company match
  • Employee stock purchase plan
  • Commuter benefits
  • In-house wellness program
  • Broad learning & development opportunities
  • A charitable giving platform with company match
  • Fitness allowance
  • Employee discount programs
  • Free games & events
  • Fulltime
Read More
Arrow Right

Lead Threat Intelligence Analyst

We are looking for a Lead Threat Intelligence Analyst. In this role, you'll be a...
Location
Location
United States , Las Vegas
Salary
Salary:
Not provided
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5-7 years of experience in cybersecurity
  • Minimum of 3 years in a dedicated threat intelligence role
  • Strong understanding of the cyber threat landscape, including knowledge of threat actor groups, common attack vectors, and malware families
  • Proven ability to analyze complex data from various sources
  • Familiarity with common threat intelligence frameworks like MITRE ATT&CK, the Cyber Kill Chain, and Diamond Model
  • Excellent written and verbal communication skills
  • Experience with threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and forensic tools
Job Responsibility
Job Responsibility
  • Lead the design, development, and continuous improvement of the organization’s cyber threat intelligence (CTI) program
  • Perform deep-dives into cyber threats, including analyzing malware, understanding adversary tactics, techniques, and procedures (TTPs), and tracking threat actor groups
  • Create and refine threat models and frameworks to predict and prepare for potential attacks
  • Work with our Global Security Operations Center (GSOC), Detection Engineering, Automation Engineers and Incident Response teams to integrate threat intelligence into our detection and prevention systems
  • Generate timely and high-quality intelligence/Threat Landscape reports, risk forecasts and alerts for technical and executive audiences
  • Promote automation of indicator ingestion, correlation, and dissemination across GSOC, Automation and IR platforms
  • Define and track key performance indicators (KPIs) for the threat intelligence program
  • Conduct periodic maturity assessments of the threat intelligence function
  • Provide guidance and mentorship to junior analysts
What we offer
What we offer
  • Medical (HSA & FSA)
  • dental
  • vision
  • 401(k) with company match
  • employee stock purchase plan
  • commuter benefits
  • in-house wellness program
  • broad learning & development opportunities
  • a charitable giving platform with company match
  • Fitness allowance
  • Fulltime
Read More
Arrow Right

Lead Threat Intelligence Analyst

We are looking for a Lead Threat Intelligence Analyst. In this role, you'll be a...
Location
Location
United States , New York
Salary
Salary:
133900.00 - 198160.00 USD / Year
take2games.com Logo
Take-Two Interactive Software, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5-7 years of experience in cybersecurity
  • Minimum of 3 years in a dedicated threat intelligence role
  • Strong understanding of the cyber threat landscape, including knowledge of threat actor groups, common attack vectors, and malware families
  • Proven ability to analyze complex data from various sources (e.g., open-source intelligence, dark web forums, technical reports) to form a cohesive threat picture
  • Familiarity with common threat intelligence frameworks like MITRE ATT&CK, the Cyber Kill Chain, and Diamond Model
  • Excellent written and verbal communication skills, with the ability to present technical information clearly to both technical and non-technical audiences
  • Experience with threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and forensic tools
Job Responsibility
Job Responsibility
  • Lead the design, development, and continuous improvement of the organization’s cyber threat intelligence (CTI) program
  • Perform deep-dives into cyber threats, including analyzing malware, understanding adversary tactics, techniques, and procedures (TTPs), and tracking threat actor groups
  • Create and refine threat models and frameworks to predict and prepare for potential attacks
  • Work with our Global Security Operations Center (GSOC), Detection Engineering, Automation Engineers and Incident Response teams to integrate threat intelligence into our detection and prevention systems
  • Generate timely and high-quality intelligence/Threat Landscape reports, risk forecasts and alerts for technical and executive audiences
  • Promote automation of indicator ingestion, correlation, and dissemination across GSOC, Automation and IR platforms
  • Define and track key performance indicators (KPIs) for the threat intelligence program
  • Conduct periodic maturity assessments of the threat intelligence function
  • Provide guidance and mentorship to junior analysts
What we offer
What we offer
  • Medical (HSA & FSA)
  • dental
  • vision
  • 401(k) with company match
  • employee stock purchase plan
  • commuter benefits
  • in-house wellness program
  • broad learning & development opportunities
  • a charitable giving platform with company match
  • Fitness allowance
  • Fulltime
Read More
Arrow Right

Protective Intelligence Analyst

The Protective Intelligence Analyst is responsible for supporting the executive ...
Location
Location
United States , Austin
Salary
Salary:
95000.00 USD / Year
aus.com Logo
Allied Universal®
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A minimum of 3 years of recent protective intelligence experience supporting executive protection teams and principals, or 5+ years of equivalent military, law enforcement, or intelligence experience.
  • Bachelor’s degree in Intelligence Studies, International Relations, Homeland Security, or related field (or equivalent operational experience).
  • Formal Intelligence Training certification (Military, Government, Association, or Private Sector) required.
  • Advanced training in threat assessment, travel risk management, or protective intelligence preferred.
  • Skilled in open-source (OSINT) and social media research, threat monitoring, and incident verification.
  • Experience producing protective intelligence products—threat assessments, travel risk reports, route/residence assessments, and pre-travel advisories.
  • Ability to collect, vet, and analyze information using the intelligence cycle to create accurate, actionable, bias-mitigated reporting.
  • Strong understanding of global security, geopolitical risks, terrorism, crime, and crisis response as they relate to executive travel and operations.
  • Proven ability to support EP operations in real time, providing clear, concise, and timely threat updates to decision-makers.
  • Proficiency in Microsoft Office Suite and familiarity with protective intelligence platforms (e.g., Factal, Dataminr, Babel Street, LifeRaft, Echosec).
Job Responsibility
Job Responsibility
  • Threat Monitoring & Early Warning: Continuously monitor open sources, social media platforms, dark web, and client-specific intelligence tools for threats or hostile surveillance activity directed at principals, their families, residences, travel plans, or affiliated events.
  • Protective Research & Threat Analysis: Conduct in-depth research and analysis on persons of interest (POIs), hostile actors, and groups with the intent or capability to target principals. Assess motivations, capability, opportunity, and intent to identify potential attack indicators.
  • Travel Risk Intelligence: Provide proactive intelligence support to executive protection teams during domestic and international travel, including country risk assessments, route reconnaissance, hotel and venue security reviews, and incident monitoring during trips. Deliver timely updates to traveling principals and EP teams.
  • Protective Operations Support: Deliver actionable, real-time intelligence to EP teams in support of principal movements, protective advances, route planning, and residence/event security. Maintain constant threat environment awareness and communicate relevant changes.
  • Geopolitical & Environmental Risk Tracking: Monitor global and regional security issues, including terrorism, political unrest, crime trends, natural disasters, and health risks—that could affect principals’ safety during travel or at residences/events.
  • Actionable Reporting & Products: Produce timely, clear, and actionable intelligence products including: Threat assessments (strategic and tactical), Travel risk assessments (pre-trip and in-trip updates), Situation reports (SITREPs) and incident summaries, Route and location assessments (residences, hotels, venues, offices)
  • Threat Mitigation Recommendations: Provide practical, proportionate recommendations to EP teams on how to mitigate identified threats, risks, and vulnerabilities. Offer clear triggers and indicators for escalation or operational adjustments.
  • Database & Knowledge Management: Maintain a structured, cross-referenced database of threats, POIs, incidents, and lessons learned to support future operations and ensure continuity of protective intelligence programs.
  • Confidentiality & Security: Safeguard sensitive client information, personal identifiers, and operational details at all times, adhering to strict confidentiality and need-to-know principles.
  • Operational Integration: Serve as the intelligence liaison to executive protection, event security, and corporate security teams, ensuring protective intelligence is integrated into all protective operations.
What we offer
What we offer
  • Employee Assistance Program
  • Employee Discount Program
  • Tuition Discount Program
  • Training & Career Development Programs
  • Fulltime
Read More
Arrow Right