Mid-Level Analyst - Cyber Threat Fusion Intelligence
- Job ID
- R0110253
- Date posted
- 07/24/2025
Why USAA?
At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families.
Embrace a fulfilling career at USAA, where our core values – honesty, integrity, loyalty and service – define how we treat each other and our members. Be part of what truly makes us special and impactful.
The Opportunity
The Cyber Threat Fusion Intelligence Team (CFIT) is seeking a motivated Mid-level Analyst with demonstrated experience in cyber threat-centric and cyber-criminal Fraud analytic capabilities. This candidate will drive our strategic intelligence program while integrating with our technical and operational intelligence programs to support operations, cyber fraud threat hunting missions, vulnerability management, insider threat, and business requirements while ensuring that senior leaders are advised of current and ongoing threats allowing them to make informed decisions. The CTI team is USAA’s premier cyber intelligence program dedicated to support our Cyber Threat Operation Center (CTOC). The CTOC exists to detect, analyze, and respond to cyber security events. The CTOC is comprised of several teams, all reporting to the ED of IS Engineering & Cybersecurity. These teams are individual units that partner as needed to provide centralized and coordinated response activities. Our Cyber Threat Intelligence team is responsible for collecting, analyzing, and disseminating threat intelligence regarding threat actors targeting USAA and our members. This information is used to continually enhance threat management capabilities to maximize our protective and detective cyber security posture and continuously improve our processes. Our Cyber Threat Intelligence team is responsible for collecting, analyzing, and disseminating threat intelligence regarding threat actors targeting USAA. This information is used to continually enhance threat management capabilities to maximize our protective and detective cyber security posture and continuously improve our processes. Specifically, a successful candidate will be collecting requirements from stakeholders and conducting research and analysis to provide timely and actionable intelligence that drives and informs the security posture of USAA
We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in one of the following locations: San Antonio, TX, Plano, TX, Phoenix, AZ, Colorado Springs, CO, or Charlotte, NC. Relocation assistance is not available for this position.
What you'll do:
- Researches and analyzes the latest information security vulnerabilities, threats, exploits, trends and intelligence.
- Conducts routine vulnerability management, security configuration assessments, and/or penetration testing operations and manages the resulting findings.
- Monitors internal and external networks, systems, and applications for security anomalies and events (e.g. suspicious behavior, attacks, and security breaches). Responds to cyber incidents, performing detailed analysis using complex security tools to determine root cause by using a broad range of demonstrated experience (e.g. forensics, networking, servers, coding, etc.) to determine a malicious actor's tactics, techniques, and procedures.
- Utilizes discoveries from the incident response process to make moderately complex improvements to the existing detection capabilities and security controls.
- Prepares written briefs with recommendations to leadership on latest threats, alerts, and incidents.
- Serves as a resource to team members on escalated issues of an unusual nature.
- Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures.
What you have:
- Bachelor’s degree; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree.
- 4 years of related experience in Information Security, Cybersecurity and/or Information Technology with a security focus to include accountability for complex tasks and/or projects.
- 2 years of related experience in one of the following domains: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communications and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security.
- Proficient level of business acumen in the areas of business operations, risk management, industry practices and emerging trends.
- Knowledge and application of security-related monitoring, intrusion detection and scanning tools.
- Knowledge of system administration, network, and operating system hardening techniques.
- Demonstrated ability to evaluate current security practices, identify compliance gaps, and propose remediation.
What sets you apart:
- 3+ years’ experience in delivering timely, relevant, and actionable intelligence through reports, briefings, and threat assessments to stakeholders to improve threat detection.
- Strong background with cybersecurity, threat intelligence, or data science experience in an analytical role (network forensics analyst, intelligence threat analyst, or security engineer)
- Excellent knowledge of adversarial cyber actors, to include tactics, techniques, and procedures.
- Strong understanding of the intelligence lifecycle, analytic tradecraft, and attack methodologies such as MITRE ATT&CK.
- Strong understanding of cyber fraud TTPs, and analytic tradecraft to collect these indicators
- Intermediate-level experience as a CTI analyst supporting cyber operations and incident response, with demonstrated application of CTI principles to include adversary methodologies and TTPs, IOCs, and malware analysis
- Ability to identify threat actor TTPs and campaigns, gather information for reconnaissance, including large and unstructured data sets to identify trends and anomalies indicative of malicious cyber activities
- Excellent written and verbal communication skills, with the ability to present complex information to both technical and non-technical audiences, including senior leadership.
Compensation range: The salary range for this position is: $103,450.00 - $197,730.00.
USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.).
Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location.
Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors.
The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.
Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals.
For more details on our outstanding benefits, visit our benefits page on USAAjobs.com.
Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting.
USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.