Back to Search




Mid-Level
Incident Response & Intel Analyst (Seasonal)
Confirmed live in the last 24 hours
MLB
Compensation
$25.00 - $30.00/hr
New York, New York
On-site
Posted April 6, 2026
Job Description
The Incident Response and Threat Intelligence Analyst is responsible for detecting, investigating, and responding to cybersecurity incidents, fraud, and digital threats impacting the organization and its affiliates. This role integrates incident response, threat intelligence, digital risk protection, and fraud analysis to proactively identify risks, disrupt malicious activity, and strengthen organizational defenses through actionable intelligence, investigations, and well-documented processes.
Responsibilities
- Support security and fraud incident response activities in coordination with the virtual Security Operations Center (vSOC) and internal stakeholders, including identification, containment, remediation, and post-incident analysis.
- Enhance digital risk protection, threat intelligence, and social media monitoring programs, delivering timely and actionable intelligence to support operational response and threat modeling.
- Conduct highly confidential digital and fraud investigations and produce clear, defensible investigative reports.
- Monitor and analyze the cyber threat and fraud landscape using OSINT, deep/dark web sources, industry tools, internal telemetry, and the MITRE ATT&CK framework to identify relevant threats, vulnerabilities, indicators of compromise (IOCs), and adversary tactics, techniques, and procedures (TTPs).
- Analyze system logs, transaction data, and user behavior to identify anomalies, high-risk patterns, and indicators of fraud; assess impact and develop mitigation and prevention strategies.
- Develop, maintain, and document incident-response playbooks, threat-intelligence processes, fraud workflows, policies, and procedures to improve operational consistence and effectiveness.
- Assist in producing threat intelligence briefs, metrics, and reports that communicate risk, trends, and business impact to technical and non-technical stakeholders.
- Support security awareness initiatives, including training programs and internal phishing campaigns, to strengthen organizational security and fraud resilience.
- Collaborate across teams to fulfill intelligence requests, support adversary simulation efforts, and align threat intelligence with evolving business objectives.
- Identify opportunities for security automation and SOAR-driven orchestration to improve response time, intelligence quality, and operational scalability across incident response, intelligence, and fraud programs.
- Monitor and identify instances of illegal streaming and piracy utilizing thre
aidata
Similar Jobs
ADSIPL - Karnataka
Data Engineer II, Supply Chain Analytics
Mid-LevelBengaluru, KA, IND
Amazon Web Services, Inc.
Sr Manager, Partner Success Specialists, AWS Specialist and Partner Organization
SeniorSeattle, WA, USA
Amazon Data Services UK Limited
Senior Regional Environmental Manager – EMEA, AWS Environmental
Mid-LevelLondon, GBR
Amazon Data Services Ireland Limited - A65
Senior Regional Environmental Manager – EMEA, AWS Environmental
Mid-LevelDublin, IRL