Incident Response & Intel Analyst (Seasonal)
Major League Baseball (MLB)
About the role
About
The Incident Response and Threat Intelligence Analyst is responsible for detecting, investigating, and responding to cybersecurity incidents, fraud, and digital threats impacting the organization and its affiliates. This role integrates incident response, threat intelligence, digital risk protection, and fraud analysis to proactively identify risks, disrupt malicious activity, and strengthen organizational defenses through actionable intelligence, investigations, and well-documented processes.
Responsibilities
- Support security and fraud incident response activities in coordination with the virtual Security Operations Center (vSOC) and internal stakeholders, including identification, containment, remediation, and post-incident analysis.
- Enhance digital risk protection, threat intelligence, and social media monitoring programs, delivering timely and actionable intelligence to support operational response and threat modeling.
- Conduct highly confidential digital and fraud investigations and produce clear, defensible investigative reports.
- Monitor and analyze the cyber threat and fraud landscape using OSINT, deep/dark web sources, industry tools, internal telemetry, and the MITRE ATT&CK framework to identify relevant threats, vulnerabilities, indicators of compromise (IOCs), and adversary tactics, techniques, and procedures (TTPs).
- Analyze system logs, transaction data, and user behavior to identify anomalies, high-risk patterns, and indicators of fraud; assess impact and develop mitigation and prevention strategies.
- Develop, maintain, and document incident-response playbooks, threat-intelligence processes, fraud workflows, policies, and procedures to improve operational consistence and effectiveness.
- Assist in producing threat intelligence briefs, metrics, and reports that communicate risk, trends, and business impact to technical and non-technical stakeholders.
- Support security awareness initiatives, including training programs and internal phishing campaigns, to strengthen organizational security and fraud resilience.
- Collaborate across teams to fulfill intelligence requests, support adversary simulation efforts, and align threat intelligence with evolving business objectives.
- Identify opportunities for security automation and SOAR-driven orchestration to improve response time, intelligence quality, and operational scalability across incident response, intelligence, and fraud programs.
- Monitor and identify instances of illegal streaming and piracy utilizing threat intelligence monitoring platforms, and manage the submission and execution of takedown efforts to support anti-piracy and brand protection initiatives.
Qualifications & Skills
- Bachelor’s or Master’s degree (completed or in progress) in Cybersecurity, Information Security, Software Engineering, or a related field.
- Demonstrated experience supporting incident response and conducting in-depth cyber, fraud, or digital investigations using OSINT, social media platforms, industry tools, and internal data sources.
- Strong understanding of malicious adversaries, threat actors, and campaigns, including indicators of compromise (IOCs) and adversary tools, techniques, and procedures (TTPs).
- Ability to handle highly sensitive and confidential information with discretion and professionalism.
- Excellent organizational, time management, documentation, and communication skills, with the ability to clearly articulate complex technical concepts, attack methods, and investigative findings to both technical and non-technical audiences.
- Familiarity with threat intelligence methodologies, analytical frameworks (e.g., MITRE ATT&CK), and intelligence reporting best practices.
- Foreign language proficiency in Spanish, Russian, Farsi, and/or Mandarin is a plus.
Pay Range
$25.00-$30.00 per hour
Why MLB?
Major League Baseball (MLB) is the most historic of the major professional sports leagues in the United States and Canada. Employees love working at MLB because of the culture of growth, teamwork, and professionalism. Employees who are most successful at MLB take initiative, know how to identify problems and provide solutions, and always put the Team first. For those ready to step up to the plate and join the major leagues, MLB takes the same approach as teams do with their players: empowering our “workforce athletes” to be at their best by engineering experiences that put employees in the best position to succeed. Major League Baseball is looking for candidates who are passionate about growing America’s pastime to best serve its fans for decades to come.
Additional Information
- California Residents: Please see our California Recruitment Privacy Policy for more details.
- Colorado Residents: Colorado based applicants may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
- Applicants requiring a reasonable accommodation for any part of the application and hiring process, please email us at accommodations@mlb.com. Requests received for non-disability related issues, such as following up on an application, will not receive a response.
- Are you ready to Step Up to the Plate?
Requirements
- Demonstrated experience supporting incident response and conducting in-depth cyber, fraud, or digital investigations using OSINT, social media platforms, industry tools, and internal data sources.
- Strong understanding of malicious adversaries, threat actors, and campaigns, including indicators of compromise (IOCs) and adversary tools, techniques, and procedures (TTPs).
- Ability to handle highly sensitive and confidential information with discretion and professionalism.
- Excellent organizational, time management, documentation, and communication skills, with the ability to clearly articulate complex technical concepts, attack methods, and investigative findings to both technical and non-technical audiences.
- Familiarity with threat intelligence methodologies, analytical frameworks (e.g., MITRE ATT&CK), and intelligence reporting best practices.
Responsibilities
- Support security and fraud incident response activities in coordination with the virtual Security Operations Center (vSOC) and internal stakeholders, including identification, containment, remediation, and post-incident analysis.
- Enhance digital risk protection, threat intelligence, and social media monitoring programs, delivering timely and actionable intelligence to support operational response and threat modeling.
- Conduct highly confidential digital and fraud investigations and produce clear, defensible investigative reports.
- Monitor and analyze the cyber threat and fraud landscape using OSINT, deep/dark web sources, industry tools, internal telemetry, and the MITRE ATT&CK framework to identify relevant threats, vulnerabilities, indicators of compromise (IOCs), and adversary tactics, techniques, and procedures (TTPs).
- Analyze system logs, transaction data, and user behavior to identify anomalies, high-risk patterns, and indicators of fraud; assess impact and develop mitigation and prevention strategies.
- Develop, maintain, and document incident-response playbooks, threat-intelligence processes, fraud workflows, policies, and procedures to improve operational consistence and effectiveness.
- Assist in producing threat intelligence briefs, metrics, and reports that communicate risk, trends, and business impact to technical and non-technical stakeholders.
- Support security awareness initiatives, including training programs and internal phishing campaigns, to strengthen organizational security and fraud resilience.
- Collaborate across teams to fulfill intelligence requests, support adversary simulation efforts, and align threat intelligence with evolving business objectives.
- Identify opportunities for security automation and SOAR-driven orchestration to improve response time, intelligence quality, and operational scalability across incident response, intelligence, and fraud programs.
- Monitor and identify instances of illegal streaming and piracy utilizing threat intelligence monitoring platforms, and manage the submission and execution of takedown efforts to support anti-piracy and brand protection initiatives.
Skills
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free