Cyber Threat Intelligence - Lead Analyst

Eli Lilly Eli Lilly · Pharma · Indianapolis, IN +1 · Remote

Lead Analyst for Cyber Threat Intelligence (CTI) at Eli Lilly, focusing on strategy, operations, and team development. This player/coach role involves hands-on technical leadership in threat analysis and attribution, while also shaping the function's strategy, developing analysts, and representing the team in various forums. Responsibilities include threat actor tracking, brand and executive protection, partner collaboration, intelligence sharing, team leadership, and enhancing tooling for automated enrichment and response workflows.

What you'd actually do

  1. Lead the continued development and maturation of the Cyber Threat Intelligence function, advancing it from intelligence consumer to intelligence producer and contributor across the pharmaceutical industry and the broader cyber community.
  2. Maintain personal technical proficiency in threat analysis, attribution, and intelligence tradecraft. Be the example on complex analytical work, set the technical bar for the team, and remain credible at the keyboard while developing analyst capability.
  3. Direct the threat actor tracking and attribution program as a multi-functional Cybersecurity capability — championing adoption across response, detection, architecture, platforms, threat mitigation, identity, and other defensive functions, while remaining accountable for the program's outputs, methodology, and long-term maturation.
  4. Lead the cyber threat intelligence components of brand and executive protection, in close coordination with Corporate Security, Legal, the Brand Office, and other partners.
  5. Develop and maintain strong working relationships with key partners across Cybersecurity, Corporate Security, HR, Legal, the Brand Office, Ethics & Compliance, and Tech@Lilly.

Skills

Required

  • Cybersecurity
  • Cyber Threat Intelligence
  • threat actor tracking
  • attribution
  • analytical methods
  • defensive decisions
  • malware analysis
  • reverse engineering
  • campaign tracking
  • adversary objectives
  • techniques
  • patterns

Nice to have

  • player/coach
  • technical depth
  • leading a team
  • shaping strategy
  • analytical and problem-solving skills
  • intelligence that drives decisions
  • leading or significantly contributing to a threat actor tracking

What the JD emphasized

  • Demonstrated experience materially contributing to threat actor tracking, attribution, and analytical methods that directly inform defensive decisions.
  • Evidence of skills in areas e.g., malware analysis and/or reverse engineering, and campaign tracking to understand adversary objectives, techniques, and patterns.