CrawlJobs Logo

Threat & Identity Analyst

nicollcurtin.com Logo

Nicoll Curtin

Location Icon

Location:
Malaysia

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

A leading global bank is seeking an Identity Threat Intelligence Analyst to support the Identity Threat Detection and Response (ITDR) program. This role provides identity-focused threat intelligence, analysis, and detection insights to strengthen identity security capabilities. The analyst will assess identity threat coverage across existing security tools, support proof-of-value (PoV) initiatives, and translate threat intelligence into actionable detection scenarios and pilot-ready use cases across enterprise platforms.

Job Responsibility:

  • Analyse identity-focused threat intelligence and attacker techniques relevant to enterprise environments
  • Assess identity threat detection coverage across existing security platforms (e.g., identity monitoring and cloud security tools)
  • Map identity threat scenarios across Active Directory, Entra ID, cloud platforms (Azure/AWS), UNIX, and hybrid infrastructure
  • Support proof-of-value (PoV) activities by validating threat scenarios against available detections and telemetry
  • Align identity threat scenarios with MITRE ATT&CK tactics and techniques
  • Translate threat intelligence into prioritized ITDR detection use cases and scenarios
  • Collaborate with ITDR engineers, IAM teams, and security operations to refine detection logic and response strategies
  • Support development and rollout of ITDR pilot capabilities for prioritized identity threats
  • Maintain documentation of identity threat scenarios, adversary techniques, and detection use cases
  • Produce threat intelligence reports, PoV findings, and program artefacts for governance and planning
  • Track emerging identity threats, attacker techniques, and industry trends

Requirements:

  • 5+ years of experience in threat intelligence, cybersecurity analysis, or cyber defense
  • Strong understanding of identity and access management (IAM) technologies including Active Directory, Entra ID, privileged access, and non-human identities
  • Familiarity with cloud and hybrid environments including Azure, AWS, and enterprise infrastructure platforms
  • Knowledge of identity-based attack techniques and frameworks such as MITRE ATT&CK
  • Experience translating threat intelligence into detection use cases or security controls
  • Familiarity with security monitoring, detection engineering, or security operations
  • Strong analytical, research, documentation, and stakeholder communication skills
  • Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or a related field
  • 7–9 years of overall cybersecurity experience preferred, with exposure to identity threat intelligence or ITDR programs

Additional Information:

Job Posted:
March 19, 2026

Employment Type:
Fulltime
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Threat & Identity Analyst

Senior SOC Analyst

An ideal candidate will have experience in the Microsoft security products since...
Location
Location
United States , Lawrenceville
Salary
Salary:
Not provided
dashtechinc.com Logo
Dash Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Microsoft Defender for Identity (Threat Explorer, Tenant Block/Allow Lists, Incidents and Alerts, etc)
  • Microsoft Active Directory
  • Microsoft Entra ID (formerly Azure Active Directory)
  • MS Sentinel (SIEM, and Investigations)
  • Knowledge in Defender Kusto Query Language
  • Experience in Microsoft security products (MS Defender
  • MS Entra ID
  • On-premises Active Directory)
Job Responsibility
Job Responsibility
  • Monitoring and remediating security alerts from Sentinel and Defender
  • Helping develop Sentinel workflows/workbooks for automating response
  • Utilizing MS Threat Explorer and Advanced Hunting for investigations
  • Configuring Exchange transport rules with respect to security events
  • Configuring Defender Tenant Block/Allow lists
  • Providing forensic data for future investigations
  • Fulltime
Read More
Arrow Right

Security Analyst

This is a hands-on Security Analyst supporting a compliance sensitive environmen...
Location
Location
United States , Dallas
Salary
Salary:
100000.00 - 110000.00 USD / Year
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • CrowdStrike
  • Microsoft 365 Defender
  • Email security platforms (Mimecast or equivalent)
  • Active Directory / Entra ID
  • 2–5 years of security analyst experience
  • Hands-on EDR + email security experience
  • Comfortable working with SIEM tools (SUMO Logic)
  • Strong phishing/BEC investigation background
  • Experience in regulated or compliance-sensitive environments (legal, healthcare, finance is a plus)
  • Able to work independently and document work thoroughly
Job Responsibility
Job Responsibility
  • Lead investigations for endpoint, identity, and email-based threats
  • Identity abuse, anomalous sign-ins, and MFA-bypass attempts
  • Triage and respond to phishing, business email compromise (BEC), and impersonation attempts
  • Endpoint isolation and host remediation
  • Develop and maintain investigation playbooks
  • Track patch compliance
  • Assist with audit evidence collection
  • IOC scoping and threat-hunting pivots across SIEM and EDR
What we offer
What we offer
  • medical
  • vision
  • dental
  • life and disability insurance
  • 401(k) or deferred compensation plan (if eligible)
  • paid time off for vacation, personal needs, and sick time
  • paid holidays
  • Fulltime
Read More
Arrow Right

Senior Applied AI Scientist

Microsoft Sentinel Platform NEXT R&D labs is the strategic incubation engine beh...
Location
Location
United States , Multiple Locations
Salary
Salary:
119800.00 - 234700.00 USD / Year
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's Degree in Statistics, Econometrics, Computer Science, Electrical or Computer Engineering, or related field AND 4+ years related experience (e.g., statistics predictive analytics, research) OR Master's Degree in Statistics, Econometrics, Computer Science, Electrical or Computer Engineering, or related field AND 3+ years related experience (e.g., statistics, predictive analytics, research) OR Doctorate in Statistics, Econometrics, Computer Science, Electrical or Computer Engineering, or related field AND 1+ year(s) related experience (e.g., statistics, predictive analytics, research) OR equivalent experience
  • Candidates must be able to meet Microsoft, customer and/or government security screening requirements are required for this role
  • This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter
  • Master's Degree in Statistics, Econometrics, Computer Science, Electrical or Computer Engineering, or related field AND 6+ years related experience (e.g., statistics, predictive analytics, research) OR Doctorate in Statistics, Econometrics, Computer Science, Electrical or Computer Engineering, or related field AND 3+ years related experience (e.g., statistics, predictive analytics, research) OR equivalent experience
  • 3+ years working with Machine Learning (ML)/Artificial Intelligence (AI) systems (e.g., Large Language Models (LLM/LRM)/Generative AI (GenAI), retrieval/Retrieval-Augmented Generation (RAG), model serving, experimentation platforms, data pipelines) including establishing evaluation metrics and improving model quality
  • Demonstrated success driving zero-to-one (0→1) initiatives
  • ML background and hands-on experience
  • Experience with ML lifecycle: model training, fine-tuning, evaluation, continuous monitoring, and more
  • Coding ability in one or more languages (e.g., Python, C#, C++, Rust, JavaScript/TypeScript)
  • Familiarity and previous work in the field of cybersecurity (e.g., threat detection/response, SIEM/SOAR, identity, endpoint, cloud security) and familiarity with analyst workflows
Job Responsibility
Job Responsibility
  • AI/ML Research: design, development, and analysis of novel AI and machine learning models and algorithms for security and enterprise-scale applications
  • Innovate Across Domains: Explore and apply a broad spectrum of AI/ML techniques, including deep learning, Bayesian probabilistic modeling, classical ML, generative models, and hybrid approaches
  • Experimentation & Evaluation: Design and execute experiments, simulations, and evaluations to validate models and system performance, ensuring measurable improvements
  • Collaboration: Partner with engineering, product, and research teams to translate scientific advances into robust, scalable, and production-ready solutions
  • Customer Impact: Engage with enterprise customers and field teams to co-design solutions, gather feedback, and iterate quickly based on real-world telemetry and outcomes
  • Fulltime
Read More
Arrow Right

Principal AI Engineer

NEXT is the incubation and research arm of Microsoft Security AI (MSECAI), build...
Location
Location
United States , Redmond
Salary
Salary:
139900.00 - 274800.00 USD / Year
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's Degree in Computer Science or related technical field AND 6+ years technical engineering experience with coding in languages including, but not limited to, C, C++, C#, Java, JavaScript, or Python OR equivalent experience
  • Ability to meet Microsoft, customer and/or government security screening requirements
  • This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter
  • Master's Degree in Computer Science or related technical field AND 8+ years technical engineering experience with coding in languages including, but not limited to, C, C++, C#, Java, JavaScript, or Python OR Bachelor's Degree in Computer Science or related technical field AND 12+ years technical engineering experience with coding in languages including, but not limited to, C, C++, C#, Java, JavaScript, or Python OR equivalent experience
  • 6+ years of experience driving complex, cross-functional initiatives
  • experience leading without authority across multiple teams
  • 3+ years working with Machine Learning (ML)/Artificial Intelligence (AI) systems (e.g., Large Language Models (LLMs)/Generative AI (GenAI), retrieval/Retrieval-Augmented Generation (RAG), model serving, experimentation platforms, data pipelines) including establishing evaluation metrics and improving model quality
  • Experienced in program leadership, communication, and stakeholder management skills with the ability to influence leaders and make data-informed decisions
  • Proven track record shipping cloud services or platforms at scale (multi-tenant, high-throughput) with measurable customer and business impact
  • Security domain expertise (e.g., threat detection/response, SIEM/SOAR, identity, endpoint, cloud security) and familiarity with analyst workflows
Job Responsibility
Job Responsibility
  • Define the technical vision, strategy, and roadmap for AI-native incubation initiatives
  • align stakeholders across Security Copilot, Defender, Sentinel, Entra, Purview, Azure AI Foundry and Microsoft AI to deliver cohesive customer value
  • Lead zero-to-one (0→1) incubation R&D through MVP and private preview, then drive one-to-many (1→N) platformization and scale to GA
  • make principled tradeoffs across quality, latency, reliability, cost, and safety
  • Provide hands-on technical leadership: prototype in code, review designs and Pull Requests (PRs), define Application Programming Interfaces (APIs)/data contracts, build comprehensive well-architected systems, and establish evaluation frameworks to de-risk complex systems
  • Set strategy for AI-native security experiences and platform components: where to use Large Language Models (LLMs) versus classical Machine Learning (ML), retrieval/Retrieval-Augmented Generation (RAG) design, grounding, model routing/fallbacks, and safety guardrails to meet customer outcomes and Service Level Objectives (SLOs)
  • Ensure Responsible AI, privacy, and security guardrails are designed in from day one, coordinate safety reviews, abuse prevention, compliance, and incident readiness
  • Lead v-teams and mentor others
  • cultivate a builder culture of velocity and quality as a force multiplier
  • Engage directly with enterprise customers and field to co-design solutions and land adoption
  • Fulltime
Read More
Arrow Right

Principal AI Security Researcher

Microsoft Sentinel Platform NEXT R&D labs is the strategic incubation engine beh...
Location
Location
United States , Multiple Locations
Salary
Salary:
139900.00 - 274800.00 USD / Year
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Doctorate in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • OR Master's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • OR Bachelor's Degree in Statistics, Mathematics, Computer Science, Computer Security, or related field AND 6+ years experience in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection
  • OR equivalent experience
  • Ability to meet Microsoft, customer and/or government security screening requirements
  • Microsoft Cloud Background Check
  • 5+ years of experience in cybersecurity, AI, software development lifecycle, large-scale computing, modeling, and/or anomaly detection
  • 5+ years of professional experience in security operations, pen-testing, researching cyber threats, understanding attacker methodology, tools, and infrastructure
  • Demonstrated autonomy and success driving zero-to-one (0→1) initiatives
  • ML background and hands-on experience
Job Responsibility
Job Responsibility
  • Security AI Research: be the security expert to our AI-focused team, helping evaluate our systems on real data, improve system inputs, triage and investigate AI-based findings, leverage AI and security experience to incubate and transform our products, educate applied scientists in cybersecurity
  • Collaboration: Partner with engineering, product, and research teams to translate scientific advances into robust, scalable, and production-ready solutions
  • AI/ML Research: design, development, and analysis of novel AI and machine learning models and algorithms for security and enterprise-scale applications
  • Experimentation & Evaluation: Design and execute AI experiments, simulations, and evaluations to validate models and system performance, ensuring measurable improvements
  • Customer Impact: Engage with enterprise customers and field teams to co-design solutions, gather feedback, and iterate quickly based on real-world telemetry and outcomes
  • Fulltime
Read More
Arrow Right

SaaS IT Security Manager/Lead Type

We are looking for an experienced IT Security Manager/Production Lead Type, over...
Location
Location
United States , Tampa
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5 years of hands-on experience in information security, with 2–3 years focused on cloud environments
  • Expertise in cloud security, network security, endpoint security, and identity & access management
  • Proven ability to lead incident response processes, including forensics and comprehensive reporting
  • Thorough knowledge of SaaS security and vendor risk assessments
  • Familiarity with modern security tools such as CrowdStrike, Prisma Cloud, and Datadog Security
  • Experience with compliance frameworks like SOC 2 or ISO 27001 and audit coordination
  • Prior experience in mentoring or managing team members is strongly preferred
  • Strong communication skills to articulate technical risks and solutions to both technical and non-technical stakeholders
Job Responsibility
Job Responsibility
  • Oversee and implement the organization's security program across cloud, application, network, endpoint, identity, and SaaS platforms
  • Conduct vulnerability assessments, penetration testing, threat modeling, and security code reviews for web applications
  • Manage the incident response lifecycle, including detection, triage, containment, recovery, and post-incident reporting
  • Administer and enhance security tools and systems such as identity management, threat detection, and compliance monitoring
  • Strengthen access controls and identity management processes, ensuring privileged access and Zero Trust principles are upheld
  • Evaluate vendors and SaaS providers for security risks and oversee third-party risk management
  • Lead security awareness training sessions and simulate phishing campaigns to educate employees
  • Maintain compliance with frameworks like SOC 2 and ISO 27001, and coordinate audit activities
  • Develop and enforce security policies, standards, and procedures tailored to organizational needs
  • Mentor and manage a Security Analyst, supporting their growth through regular check-ins and performance reviews
What we offer
What we offer
  • medical
  • vision
  • dental
  • life and disability insurance
  • 401(k) plan
Read More
Arrow Right

Sr. Cybersecurity Incident Response Analyst

Blue Yonder, a leading supply chain software company, is seeking a Sr Cybersecur...
Location
Location
Mexico , Monterrey; Mexico City
Salary
Salary:
Not provided
blueyonder.com Logo
Blue Yonder
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Security, or related equivalent experience
  • 5+ years of experience in information security or cybersecurity as an analyst, engineer or consultant
  • MUST have experience with incident response methodologies and tools (e.g. SANS IR, EDR, SIEM, Threat Intelligence, etc.)
  • Strong technical skills and attention to detail
  • Excellent verbal and written communication skills
  • Ability to work independently and as part of a team
  • Ability to work under pressure and in a fast-paced environment
  • Strong problem-solving skills and a proactive approach to work
  • Knowledge of security frameworks such as NIST and ISO 27001
  • Familiarity with security regulations and standards (e.g. PCI DSS, HIPAA, etc.)
Job Responsibility
Job Responsibility
  • Monitor and Analyze Security Alerts – Review alerts generated by security systems, appliances, and logs to determine the appropriate course of action to protect the enterprise and reduce overall risk
  • Incident Triage and Response – Quickly assess, prioritize, and respond to security incidents, ensuring timely containment, eradication, and recovery to minimize business impact
  • Root Cause Analysis (RCA) – Investigate security incidents to determine root causes, attack vectors, and vulnerabilities, providing recommendations to reduce the attack surface and prevent recurrence
  • Threat Hunting and Proactive Defense – Conduct proactive threat-hunting activities based on intelligence, anomalies, and adversary tactics to identify and mitigate threats before they escalate
  • Collaboration with Cross-Functional Teams – Work closely with IT, engineering, legal, compliance, and other teams to coordinate incident response efforts and ensure an effective security posture
  • Incident Documentation and Reporting – Maintain detailed documentation of security incidents, response actions, and lessons learned, ensuring continuous improvement in security processes
  • Develop and Improve Incident Response Playbooks – Enhance and maintain incident response procedures, ensuring alignment with industry best practices and emerging threats
  • Security Awareness and Training – Provide guidance, training, and mentorship to SOC analysts and IT staff on security threats, incident handling, and response best practices
  • Threat Intelligence Integration – Leverage threat intelligence sources to stay informed on evolving cyber threats and proactively adjust security strategies to defend against them
  • Fulltime
Read More
Arrow Right

SOC Deployment Specialist

An exciting opportunity at an award-winning Microsoft Partner for a SOC Deployme...
Location
Location
United Kingdom
Salary
Salary:
45000.00 - 50000.00 GBP / Year
dynamicsearch.co.uk Logo
Dynamic Search Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Hands-on experience deploying Microsoft Sentinel within a SOC or MSSP environment
  • Strong operational knowledge of the Microsoft security stack, including: Microsoft Defender XDR, Defender for Endpoint, Defender for Cloud, Entra ID (Azure Active Directory) and Microsoft 365 security tooling
  • Solid understanding of SOC operations, alert triage, and incident response workflows
  • Proven experience working in customer-facing roles, with the ability to communicate clearly with both technical teams and non-technical stakeholders
  • Strong understanding of cloud, identity, and endpoint security in Microsoft Azure environments
  • Eligibility for SC and NPPV3 security clearance
Job Responsibility
Job Responsibility
  • Lead the deployment of Microsoft Sentinel for new customers, ensuring SOC readiness from day one
  • Integrate Microsoft Defender technologies (Defender XDR, Defender for Endpoint, Defender for Cloud, Defender for Identity) with Sentinel to deliver unified threat visibility
  • Work closely with SOC analysts to ensure detections are relevant, actionable, and aligned to SOC operating procedures
  • Engage directly with customer stakeholders to gather requirements, explain SOC capabilities, and support successful service onboarding
  • Validate data sources, detection coverage, and alert quality to ensure deployments meet operational and SLA requirements
  • Support transition of deployed environments into business-as-usual SOC operations, providing documentation and technical handover
  • Assist with tuning, optimisation, and ongoing improvement of customer SOC environments post-deployment
What we offer
What we offer
  • Opportunity to work with cutting-edge Microsoft security technologies
  • Strong emphasis on training and certification
  • Fulltime
Read More
Arrow Right