Make your mark at Comcast -- a Fortune 30 global media and technology company. From the connectivity and platforms we provide, to the content and experiences we create, we reach hundreds of millions of customers, viewers, and guests worldwide. Become part of our award-winning technology team that turns big ideas into cutting-edge products, platforms, and solutions that our customers love. We create space to innovate, and we recognize, reward, and invest in your ideas, while ensuring you can proudly bring your authentic self to the workplace. Join us. You’ll do the best work of your career right here at Comcast. (In most cases, Comcast prefers to have employees on-site collaborating unless the team has been designated as virtual due to the nature of their work. If a position is listed with both office locations and virtual offerings, Comcast may be willing to consider candidates who live greater than 100 miles from the office for the remote option.)
Job Summary
The Manager of Security Intelligence reports to the Director of Digital Forensic Investigations, Security Intelligence, and Incident Readiness Exercises within the Comcast Cyber Security Operations Center (CSOC). The CSOC is tasked with identifying, mitigating, and responding to all cyber threats impacting the enterprise.
In this role, the Manager of Security Intelligence will lead a team of analysts dedicated to identifying, analyzing, and mitigating cyber threats to the organization. Responsibilities include overseeing the collection and analysis of threat intelligence data, developing strategies to protect against cyber threats, and ensuring the organization maintains a robust and proactive cybersecurity posture. Additionally, this individual will manage, and lead projects focused on automating the collection, processing, and dissemination of cyber threat intelligence to internal stakeholders.
Job Description
Core Responsibilities
- Leadership and Team Management:
- Lead, Mentor, and develop a team of Intelligence analysts
- Foster a collaborative and high-performance team environment.
- Conduct performance reviews and provide professional development opportunities.
- Establish and maintain threat intelligence processes, methodologies, and frameworks.
- Collaborate with other teams, such as Security Operations (SecOps), Risk Management, and IT, to ensure intelligence is integrated into security initiatives.
- Threat Intelligence Operations:
- Oversee the gathering and analysis of open-source intelligence (OSINT), commercial threat intelligence feeds, dark web monitoring, and internal data sources.
- Ensure comprehensive threat analysis covering both external and internal threats, including APTs (Advanced Persistent Threats), malware, ransomware, and other emerging threats.
- Develop detailed threat intelligence reports and executive briefings, identifying current and potential risks to the organization.
- Develop and maintain threat intelligence processes and procedures.
- Provide actionable intelligence and insights to support security incidents and investigations.
- Assist in the identification of indicators of compromise (IoCs), tactics, techniques, and procedures (TTPs) used by adversaries
- Collaborate with risk management teams to identify and prioritize critical assets, vulnerabilities, and threats.
- Strategic Planning:
- Develop and implement a strategic roadmap for the Cyber Threat Intelligence program.
- Align security intelligence activities with the organization’s overall cybersecurity strategy.
- Identify and prioritize emerging threats and vulnerabilities.
- Work closely with internal stakeholders (e.g., CISO, legal, and compliance teams) and external partners (e.g., Information Sharing and Analysis Centers, industry groups).
- Develop and maintain relationships with threat intelligence vendors, government agencies, and other cybersecurity organizations to exchange information and enhance the program’s capabilities.
- Collaboration and Communication:
- Collaborate with other cybersecurity teams to integrate threat intelligence into security operations.
- Communicate threat intelligence findings to senior management and other stakeholders.
- Establish and maintain relationships with external threat intelligence communities and organizations.
- Compliance and Reporting:
- Ensure compliance with relevant regulations and standards.
- Prepare and present regular reports on threat intelligence activities and outcomes.
Desired Skills and Experience:
- Education & Experience:
- Possesses bachelor’s degree in computer science, Cybersecurity, or related field. Technical certifications can be used in lieu of a bachelor’s degree in the fields mentioned above.
- At least 5-10 years of experience in cybersecurity, with a focus on threat intelligence, security operations, or incident response.
- Experience in managing teams and leading threat intelligence functions.
- Exposure to Threat Hunting, Incident Response, Vulnerability Management, Digital Forensics, etc.
- Industry certifications such as CISSP, CISM, CISA, GIAC, or others are highly desirable.
- Skills & Knowledge:
- Knowledge of MITRE ATT&CK, Diamond Model, Cyber Kill Chain, and other CTI-related tradecraft from Government and non-government groups
- In-depth understanding of cyber threats, adversary tactics, techniques, and procedures (TTPs).
- Familiarity with threat intelligence platforms (TIPs), SIEM tools, and other security technologies.
- Strong knowledge of legal, regulatory, and compliance considerations related to cybersecurity.
- Excellent verbal and written communication skills, with the ability to present technical information to senior management.
- Personal Attributes:
- Strong problem-solving and analytical skills.
- Ability to work under pressure and meet deadlines.
- Collaborative and proactive in working across various teams.
- Detail-oriented with a focus on producing high-quality, actionable intelligence.
Employees at all levels are expected to:
- Understand our Operating Principles; make them the guidelines for how you do your job.
- Own the customer experience - think and act in ways that put our customers first, give them seamless digital options at every touchpoint, and make them promoters of our products and services.
- Know your stuff - be enthusiastic learners, users and advocates of our game-changing technology, products and services, especially our digital tools and experiences.
- Win as a team - make big things happen by working together and being open to new ideas.
- Be an active part of the Net Promoter System - a way of working that brings more employee and customer feedback into the company - by joining huddles, making call backs and helping us elevate opportunities to do better for our customers.
- Drive results and growth.
- Respect and promote inclusion & diversity.
- Do what's right for each other, our customers, investors and our communities.
Disclaimer:
This information has been designed to indicate the general nature and level of work performed by employees in this role. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications.
Skills
Communication, Cyber Threat Intelligence, Leadership
We believe that benefits should connect you to the support you need when it matters most, and should help you care for those who matter most. That's why we provide an array of options, expert guidance and always-on tools that are personalized to meet the needs of your reality—to help support you physically, financially and emotionally through the big milestones and in your everyday life.
Please visit the benefits summary on our careers site for more details.
Education
Bachelor's DegreeWhile possessing the stated degree is preferred, Comcast also may consider applicants who hold some combination of coursework and experience, or who have extensive related professional experience.
Certifications (if applicable)
Relative Work Experience
5-7 YearsComcast is proud to be an equal opportunity workplace. We will consider all qualified applicants for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability, veteran status, genetic information, or any other basis protected by applicable law.