Important Application Submission Information
In order to ensure your application is successfully received before the job posting expires, please submit your application by 11:59 PM on Thursday, December 18, 2025More than a career - a chance to make a difference in people's lives.Build an exciting, rewarding career with us – help us make a difference for millions of people every day. Consider joining the Duke Energy team, where you'll find a friendly work environment, opportunities for growth and development, recognition for your work, and competitive pay and benefits.
Position SummaryThe Cybersecurity Threat and Vulnerability Analyst is responsible for identifying, analyzing, prioritizing, and eradicating cyber threats and vulnerabilities across the Duke Energy environment. The Analyst will analyze threat information and work closely with peers, other internal/external teams and management to ensure that information is properly disseminated to appropriate parties for action. The Analyst assists with supporting tools which perform vulnerability scanning, configuration monitoring, and Open Source Intelligence analysis. The Analyst also is responsible for following processes and procedures as defined by Cybersecurity leadership and the Threat & Vulnerability Management team.
This role will support Duke Energy’s Application Security objectives and requires an understanding of applying security practices to software development and operations (DevSecOps). This role will focus on working with Duke Energy Enterprise Architects to operationalize Github Advanced Security, allowing for vulnerability identification, prioritization, and tracking remediation efforts.
ResponsibilitiesThoroughly research and analyze emerging cyber threats and vulnerabilities, including those specific to ICS environments, distributing relevant information to impacted business areas to increase prevention and response capabilities.
Track cyber threat actors/campaigns and techniques, tactics, and procedures based off technical analysis from government feeds and open source/third party intelligence.
Prepare written analysis of cyber threats, campaigns, and threat actor groups.
Respond to requests for ad-hoc reporting and research regarding cyber threat actors, campaigns, and associated tactics, techniques, and procedures
Provide subject matter expertise to the development of cyber operations specific indicators
Monitor and report on relevant threat activities and changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.
Leverage tools and manual methods to perform public, deep and dark web searches for threats impacting Duke Energy
Monitor open source websites for hostile content directed towards organizational or partner interests.
Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.
Develop and improve processes and metrics to advance and mature the threat and vulnerability management function
Look for opportunities to improve the threat & vulnerability management function and promote best practices for remediating cyber threats and vulnerabilities
Communicate and report on key intelligence, analysis and response activities, relevant metrics, and KPIs.
Request and track mitigations to address cyber threats and support other coordination and remediation activities.
Participate in response efforts, including afterhours events, to emergent cyber threats, providing relevant threat and vulnerability analysis information.
Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.
Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).
Utilize off-the-shelf or open source vulnerability scanning technologies to evaluate the security posture of information systems and applications.
Assist with performing risk assessments of identified vulnerabilities to determine and communicate necessary response actions required based on assessed level of threat.
Assist with developing risk mitigation strategies to resolve vulnerabilities and recommend security changes to system or system components as needed.
Provide technical support for tools which perform vulnerability analysis or configuration monitoring.
Troubleshoot identified technical issues with tools and technologies and apply patches and perform upgrades.
Work with application end users and other support personnel to troubleshoot and resolve identified issues.
Develop and maintain comprehensive technical, process, and administrative documentation.
Perform routine compliance reviews for in-scope devices as required by NERC CIP regulations.
Configure and maintain reports, r
Bachelor's degree in Cybersecurity, Managing Information Strategies (MIS) or Computer Science
2 years related work experience
In lieu of Bachelor's degree(s) AND 2 year(s) related work experience listed above, High School/GED AND 6 year(s) related work experience
NERC CIP access desired, not required
Strong written, visual and verbal communication skills
Attention to detail
Problem-solving and analytical abilities
Ability to handle multiple competing priorities
Deeply curious, always looking to learn and improve with a bias towards action
Ability to research and gather data
Collaborative in problem solving and working style to drive change through influence without direct authority
Experience with open-source and enterprise vulnerability assessment tools (Tenable, Nessus, Tripwire)
Experience with GitHub/GitHub Advanced Security
Experience in Cybersecurity, preferably with performing research on cyber threats and vulnerabilities and utilizing vulnerability assessment tools.
Experience researching and assessing cyber threats and vulnerabilities
Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.)
Knowledge of cyber intelligence/information collection capabilities and repositories.
Knowledge of cybersecurity domains, security practices, and cyber defense models, such as the Cyber Kill Chain® methodology & MITRE's ATT&CK Framework®
Knowledge of telecommunications fundamentals and common networking and routing.
Knowledge of general networking understanding and/or experience to include Understanding of TCP/IP communications & knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB
Knowledge of intelligence disciplines
Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions
Ability to utilize multiple intelligence sources across all intelligence disciplines
Windows and UNIX/Linux command line scripting experience and programming experience (Python, Powershell, etc).
Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on threats and vulnerabilities and provide briefings to various levels of staff / management.
Ability to function effectively in a dynamic, fast paced environment
Ability to research independently, multi-task, and meet deadlines under tight timeframes
Ability to develop and maintain good working relationships with internal and external business partners
Experience with writing and editing technical documentation and operational procedures
Experience in developing and improving work processes
Demonstrated effective problem solving & analytical skills
Knowledgeable of Duke Energy’s Cybersecurity policies
Innovative – ability to recognize and seek improvement and efficiency opportunities
Demonstrated commitment to training, self-study and maintaining proficiency in the technical cybersecurity domain.
Hybrid Mobility Classification – Work will be performed from both remote and onsite locations after the onboarding period. However, hybrid employees should live within a reasonable daily commute to a Duke Energy facility.
Office environment
Travel Requirements
Not requiredRelocation Assistance Provided (as applicable)NoRepresented/Union PositionNoVisa Sponsored PositionNoPlease note that in order to be considered for this position, you must possess all of the basic/required qualifications.Privacy
Do Not Sell My Personal Information (CA)
Terms of Use
Accessibility
Top Skills
Duke Energy Corporation Charlotte, North Carolina, USA Office
Carolina Ave, Charlotte, NC, United States, 28208
Duke Energy Corporation Charlotte, North Carolina, USA Office
550 South Tryon Street, Charlotte, NC, United States, 28202-1904
Similar Jobs
What you need to know about the Charlotte Tech Scene
Key Facts About Charlotte Tech
- Number of Tech Workers: 90,859; 6.5% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Lowe’s, Bank of America, TIAA, Microsoft, Honeywell
- Key Industries: Fintech, artificial intelligence, cybersecurity, cloud computing, e-commerce
- Funding Landscape: $3.1 billion in venture capital funding in 2024 (CED)
- Notable Investors: Microsoft, Google, Falfurrias Management Partners, RevTech Labs Foundation
- Research Centers and Universities: University of North Carolina at Charlotte, Northeastern University, North Carolina Research Campus


