Threat Defense Analyst II

Alaska Airlines
Date posted
13 Nov 2017
United States
Seattle, Washington

Aviation job details:

Regular/Temporary: Regular

Job ID: 31432

Full/Part Time: Full-Time

Location: Seattle, WA

Job Title: Threat Defense Analyst II


Manager, Threat Defense


Alaska Airlines is one of the most respected names in aviation and flies throughout its namesake state and the Lower 48, as well as to Hawaii, Canada, Mexico, Costa Rica and Cuba. Our roots date to 1932 and are symbolized by the Alaska Native painted on the tails of our aircraft. Guided by what we call the "Alaska Spirit", we pride ourselves on providing a lifeline to remote communities while delivering renowned service to everyone we fly. This commitment has brought us national and international recognition. We've been honored with a variety of awards by readers of Travel + Leisure, Conde Nast Traveler, USA Today and others. Alaska, with Virgin America, is the premier airline for people on the West Coast, and together with its sister carrier Horizon Air, flies to more than 118 destinations. The two airlines are subsidiaries of Alaska Air Group Inc. (NYSE:ALK) with annual revenues exceeding $7 billion. .


Role Summary The Threat Defense Analyst II partners with other analysts to support the mission of rapid threat detection and appropriate response(s). Daily duties consist of threat hunting, gathering and documenting TTP indicators of attackers to build attacker profiles, performing incident response activities, processing improvement work, and taking leadership of micro and small incident response activities.

Scope & Complexity

  • This individual contributor role requires a high level of critical thinking and event analysis. The Analyst II begins to move beyond standard process to build attacker profiles, generate documentation, and communicate more advanced threat analysis work for Alaska Air Group (AAG).

Key Duties

  • Performs analysis, triage, and response to escalated security events and incidents generated by various sources according to defined processes.

  • Performs routine hunting activities for IOCs within the enterprise to efficiently and accurately identify external and internal threat actors.

  • Provides technical leadership investigating and resolving micro-security events and incidents.

  • Participates in vulnerability management activities performing identification, analysis, validation,

...[log-in to read more or click on apply]