Staff Security Analyst, Insider Threat

Anduril Anduril · Defense · Washington, DC · Corporate Technology : Information Security : Insider Threat

Anduril Industries is seeking a Staff Security Analyst for their Insider Threat team. This role focuses on identifying, investigating, and mitigating internal security threats within the defense technology sector. Responsibilities include incident command, end-to-end investigation ownership, implementing controls, producing metrics, and providing strategic vision for threat hunting. The analyst will collaborate with HR and Legal, translate technical security issues for non-technical stakeholders, and assist in building custom tooling. Requires experience in data analysis, insider threat investigations, digital forensics, incident response, and EDR/DLP tools. A U.S. Top Secret security clearance is required.

What you'd actually do

  1. Serve Anduril as our incident commander by identifying, triaging, investigating, and remediating Insider Threat related security detections and anomalies.
  2. Own Insider Threat investigations from end to end.
  3. Lead evaluating and implementing controls to reduce Anduril's attack surface from an insider threat.
  4. Produce metrics to support and streamline incident response and investigations.
  5. Provide strategic vision for hunting and identifying insider threats.

Skills

Required

  • Action-oriented analyst with the ability to work autonomously and take ownership of complex projects.
  • Experience conducting data analysis in large-scale data lake environments.
  • Knowledge of modern adversary tradecraft and mitigating controls.
  • Proven experience in insider threat investigations, digital forensics, and incident response.
  • Experience with Endpoint Detection and Response (EDR) tools, Data Loss Prevention (DLP), and other telemetry sources.
  • Excellent analytical skills, capable of interpreting complex data and deriving actionable insights.
  • Serves as a technical mentor and force multiplier for the team, building analyst proficiency in investigation ownership, incident commanding, and insider threat tradecraft.
  • Eligible to obtain and maintain an active U.S. Top Secret security clearance.

Nice to have

  • Experience in one or more general purpose languages (Python, Go, etc) and familiarity with one or more infrastructure as code languages (e.g., Terraform, AWS CDK) in a production capacity.
  • Experience building controls around export controlled information, CUI, and other sensitive data.
  • Understanding of counterintelligence concepts and their application in security operations, particularly for identifying and addressing insider threats.
  • Bachelor’s degree in Information Systems, Information Security, Cyber Security, Computer Science, Computer Engineering and 10+ years of security analyst experience; or 12+ years of security analyst experience without a degree.

What the JD emphasized

  • Eligible to obtain and maintain an active U.S. Top Secret security clearance.