Senior Insider Threat Analyst - 642 in Brooklyn Park, Minnesota at Quantinuum
Explore Related Opportunities
Job Description
We are seeking a Senior Insider Threat Analyst in our Arlington, VA / Broomfield, CO / Brooklyn Park, MN / Albuquerque, NM, USA Location(s) or remote potential.
Quantinuum believes that employees work better, more efficiently and more collaboratively in close proximity to other employees, where ideas can be exchanged readily, and decisions can be made more quickly for the benefit of the Company and our customers. All employees should work at their assigned location; however, this role may offer the opportunity to work remotely, with approvals.
Position Overview
The Senior Insider Threat Analyst is a highly experienced individual contributor responsible for leading advanced insider threat analysis and investigations while contributing meaningfully to the evolution of detection capabilities and investigative rigor.
This role is a hands‑on execution role and handles complex cases independently, shapes detection quality, and acts as a key partner to Legal, HR, and Security.
Detection, Analysis & Threat Hunting
- Independently review, triage, and prioritize complex insider threat alerts across UEBA, DLP, identity, and endpoint telemetry
- Conduct advanced behavioral analysis to identify anomalous or malicious activity, including data exfiltration, fraud, and policy violations
- Perform proactive, hypothesis‑driven threat hunting to uncover previously undetected insider risks
- Correlate technical indicators with contextual data (e.g., HR events, organizational changes, access patterns) to assess risk accurately
- Contribute to the development, tuning, and refinement of detection use cases to improve signal fidelity and reduce false positives
Investigations
- Lead medium‑ to high‑complexity insider threat investigations from initial detection through closure
- Apply defensible investigative methodologies and sound evidence‑handling practices
- Partner closely with Legal, HR, and Security to ensure investigations align with privacy, employment, and regulatory requirements
- Produce clear investigative reports and present findings to managers and senior stakeholders
- Escalate the most sensitive or high‑risk matters appropriately
Program Contribution & Capability Development
- Contribute to the development and maintenance of insider threat playbooks, procedures, and response workflows
- Identify gaps or weaknesses in detection, investigative processes, or tooling and recommend improvements
- Assist in developing metrics, case insights, and analysis that support program reporting
- Support insider threat awareness and training initiatives for employees and security partners
Collaboration & Influence
- Act as a trusted partner to Legal, HR, IT, and business stakeholders during investigations
- Translate technical findings into clear, actionable insights for non‑technical audiences
- Informally mentor junior analysts and help reinforce investigative best practices and analytical standards
- Bachelor’s degree minimum
- Minimum 6+ years of experience in insider threat, cybersecurity, digital forensics, or a closely related field
- Due to Contractual requirements, must be a U.S. Person defined as, U.S. citizen permanent resident or green card holder, workers granted asylum or refugee status
- Due to national security requirements imposed by the U.S. Government, candidates for this position must not be a People's Republic of China national or Russian national unless the candidate is also a U.S. citizen.
- Demonstrated experience handling complex insider risk investigations involving data misuse, fraud, or policy violations
- Strong analytical skills in behavioral analysis and anomaly detection
- Practical experience correlating technical data with human and business context
- Strong written and verbal communication skills
- Bachelor’s degree in Cybersecurity, Computer Science, Criminal Justice, or related field
- Experience with UEBA, DLP, SIEM, identity, and endpoint monitoring technologies
- Proficiency with log analysis and query languages (e.g., KQL, SPL, SQL)
- Background in corporate security investigations or incident response
- Familiarity with insider threat frameworks and human‑risk concepts
$112,000 - $140,000 a year