Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailTitle : SOC (Security Operations Center) Senior Threat Analyst 2
Location: (Onsite) 11 MetroTech Center 5th Floor (SOC) Brooklyn NY 11201
Client: DEPARTMENT OF INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS
Visa: USC GC EADGC H4 and OPT
Duration: 12 Months contract
Interview: Video
Experience: 8 years
Shift Schedule: Night shifts will typically occur between the hours of 6:00 PM and 6:00 AM. The night SOC analyst position will include weekend shifts. The position requires a total of 35 hours per week.
Night Shifts / Weekend Shifts (not including a mandatory unpaid meal break after 6 hours of work) 35 work hours per week. If the consultant works more than 35 hours per week the consultant must request overtime in the Agencys timekeeping system and the project manager must approve those hours worked above the weekly maximum.
JOB DESCRIPTION:
The Senior Threat Analyst position at NYC Cyber Command is mandated as part of a critical initiative due to the escalating cybersecurity threats faced by the citys infrastructure public services and sensitive data. In an era where cyberattacks are becoming increasingly sophisticated and prevalent the role of a Senior Threat Analyst is paramount in fortifying the citys defenses analyzing emerging threats and developing proactive measures to mitigate potential risks. Failure to fill this position not only exposes NYC to heightened vulnerabilities but also jeopardizes public health and safety initiatives reliant on secure digital systems. Without this Senior Threat Analyst the city is susceptible to data breaches infrastructure disruptions and potential compromise of critical services thereby compromising the safety and wellbeing of its residents and visitors alike
SCOPE OF SERVICES TASKS:
Perform many critical functions within the Threat Management discipline including staffing 24x7x365 coverage at the Citys Security Operations Center (SOC) augmenting FTE shift schedules including days nights weekends and holidays.
Interface with OTI Cyber Command teams internally with City agencies vendors and informationsharing partners.
Monitor City networks and security alerts for intrusion attempted compromise and anomalous behavior; apply mitigation techniques or escalation factors; correlate threat intelligence across various logs collected by established security controls.
Produce routine SOC metrics & reporting.
Maintain situation reports (SITREPS)
Perform weekly quality control checks.
Works closely with SOC Director on incident preparation including the continuous development of new SOC playbooks and runbooks
MANDATORY SKILLS/EXPERIENCE Note:
Candidates who do not have the mandatory skills will not be considered Minimum 8 years of experience in Threat Management/SOC/Incident Response environment.
For this senior position leadership skills are a must including the ability to lead and mentor junior analysts coordinate team activities and manage SOC operations effectively.
Prior experience working in a SOC environment is mandatory. This includes familiarity with SOC operations procedures and tools such as SIEM (Security Information and Event Management) systems intrusion detection/prevention systems (IDS/IPS) and endpoint detection and response (EDR) tools
DESIRABLE SKILLS/EXPERIENCE:
Knowledge of cybersecurity principles practices and procedures
Strong understanding of network and host technologies
Experience applying techniques for detecting host and networkbased intrusion using IDS methods and technologies.
Experience with SIEM technologies malware analysis and mitigation techniques
Apply cybersecurity and privacy principles to organizational requirements (confidentiality integrity availability authentication nonrepudiation)
Interpret information collected by diagnostic network tools (Netflow security event logs IDS systems etc.)
Ability to investigate and solve complex problems.
Excellent communication skills are crucial for effectively communicating security incidents risks and recommendations to technical and nontechnical stakeholders including SOC Director and senior management.
Threat Hunting: Proactive threat hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents.
Incident Response: Experience in incident response procedures and methodologies including the ability to analyze security incidents contain threats mitigate risks and recover from security breaches effectively and efficiently
SPECIAL REQUIREMENTS: ***Candidate must be willing to work days nights and/or weekends depending on coverage or critical incident response needs***
Full Time