Insider Threat Analyst

The Coca-Cola Company

Position Overview
The Coca-Cola Company is looking for an Analyst to join the Insider Threat Management team.  This team is responsible for utilizing a wide variety of security tools across multiple environments to identify, mitigate insider threats, and support the enterprise’s investigative functions.  The position will reside within the Global Cybersecurity organization and reports to the Insider Threat Manager.

The Insider Threat Analyst will:

Assist digital investigations involving the Company’s intellectual property, financial and privacy data, including resolution of potentially criminal matters.
Provide operational and technical support to core systems utilized by the program and collaborate with other analyst team members.
Work with key stakeholders responsible for the Company’s intellectual property to assess specific threats to their operations, design mitigation strategies and influence business leadership to comply with the Company’s information security policies.
Collaborate with associates in Platform Services, the People function, the Legal Function, and the Operating Units to align on strategy and enforce the subsequent controls required to prevent data loss.

Function Related Activities/Key Responsibilities

Perform complex digital investigations supporting data loss prevention and insider threat programs.
Perform data analytics and present findings to the Insider Threat Manager.
Communicate technically complex content to non-technical audiences.
Demonstrate experience or working knowledge with the following:Cyber security systems, such as Splunk and the Microsoft Security Suite (e.g. Defender ATP, Security & Compliance Center, MCAS, etc.)
Computer forensics techniques and current cyber threat environment
Information technology including network, workstation, cloud, mobile & IoT security
User behavior analytics tools and techniques
Leading information security vendors and technology solutions
Education Requirements: 

Bachelor’s Degree or equivalent in appropriate field.
Relevant information security certifications preferred – CISSP, CFCE, CCE, GCIA, GCIH, Security+, and/or EnCE.

Related Work Experience: 

3 to 5 years of work experience in security operations, information technology, and/or related field.
2+ years of experience with Endpoint forensics.
2+ years of experience with Cloud forensics.
2+ years of experience with Mobile forensics.
2+ years of experience in digital forensics, insider threat, security operations or supporting an incident response team.

Before applying for this position you need to submit your online resume. Click the button below to continue.

Thank you to our 2021 Annual Supporters

President's Circle

President's Circle

Strategic Alliance Circle

President's Circle

President's Circle

President Circle

Advocate Circle

Sponsor Circle

Ambassador Circle

WIT Friend

Slider

Become a Member Today

Be Part of the WIT Movement and join our community of technology leaders, professionals and students TODAY!
Membership with Women In Technology is FREE