drjobs Senior Threat Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Jobs by Experience drjobs

5years

Job Location drjobs

Brooklyn, NY - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Job title:Senior Threat Analyst
Work Location: Onsite at 11 MetroTech Center 5th Floor (SOC)
Brooklyn NY 11201

SPECIAL REQUIREMENTS:
***Candidate must be willing to work days nights and/or weekends depending on coverage or
critical incident response needs***

Job Description:

The Senior Threat Analyst position at NYC Cyber Command is mandated as part of a critical initiative due to the escalating cybersecurity threats faced by the citys infrastructure public services and sensitive an era where cyberattacks are becoming increasingly sophisticated and prevalent the role of a Senior Threat Analyst is paramount in fortifying the citys defenses analyzing emerging threats and developing proactive measures to mitigate potential risks. Failure to fill this position not only exposes NYC to heightened vulnerabilities but also jeopardizes public health and safety initiatives reliant on secure digital this Senior Threat Analyst the city is susceptible to data breaches infrastructure disruptions and potential compromise of critical services thereby compromising the safety and well-being of its residents and visitors alike.

SCOPE OF SERVICES:
Perform many critical functions within the Threat Management discipline including staffing 24x7x365 coverage at the City s Security Operations Center (SOC) augmenting FTE shift schedules including days nights weekends and holidays.
Interface with OTI Cyber Command teams internally with City agencies vendors and information-sharing partners.
Monitor City networks and security alerts for intrusion attempted compromise and anomalous behavior; apply mitigation techniques or escalation factors; correlate threat intelligence across various logs collected by established security controls.
Produce routine SOC metrics & reporting.
Maintain situation reports (SITREPS)
Perform weekly quality control checks.
Works closely with SOC Director on incident preparation including the continuous development of new SOC playbooks and runbooks.

MANDATORY SKILLS/EXPERIENCE
Note: Candidates who do not have the mandatory skills will not be considered
  • Minimum 8 years of experience in Threat Management/SOC/Incident Response environment.
  • For a senior position leadership this includes the ability to lead and mentor junior analysts coordinate team activities and manage SOC operations effectively.
  • Prior experience working in a SOC environment is mandatory. This includes familiarity with SOC operations procedures and tools such as SIEM (Security Information and Event
  • Management) systems intrusion detection/prevention systems (IDS/IPS) and endpoint detection and response (EDR) tools.
DESIRABLE SKILLS/EXPERIENCE:
  • Knowledge of cybersecurity principles practices and procedures
  • Strong understanding of network and host technologies
  • Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.
  • Experience with SIEM technologies malware analysis and mitigation techniques
  • Apply cybersecurity and privacy principles to organizational requirements (confidentiality integrity availability authentication repudiation)
  • Interpret information collected by diagnostic network tools (Netflow security event logs IDS systems etc.)
  • Ability to investigate and solve complex problems.
  • Excellent communication skills are crucial for effectively communicating security incidents
  • risks and recommendations to technical and non-technical stakeholders including SOC Director and senior management.
  • Threat Hunting: Proactive threat hunting capabilities to identify and investigate potential
  • security threats or anomalies within the environment before they escalate into incidents.
  • Incident Response: Experience in incident response procedures and methodologies including the ability to analyze security incidents contain threats mitigate risks and recover from security breaches effectively and efficiently.
If you are: bright motivated skilled a difference-maker able to get things done work with minimum direction
enthusiastic a thinker able to juggle and multi-task communicate effectively and lead then
we would like to hear from you. We need exceptionally capable people for this role for our client
so get back to us and tell us why you think you are a fit.

About Us:

Since 2000 Tri-Force Consulting Services () has been an MBE/SDB certified IT Consulting

Knowledge of cybersecurity principles, practices, and procedures Strong understanding of network and host technologies Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies. Experience with SIEM technologies, malware analysis and mitigation techniques Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, repudiation) Interpret information collected by diagnostic network tools (Netflow, security event logs, IDS systems, etc.) Ability to investigate and solve complex problems. Excellent communication skills are crucial for effectively communicating security incidents, risks, and recommendations to technical and non-technical stakeholders, including SOC Director and senior management. Threat Hunting: Proactive threat hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents. Incident Response: Experience in incident response procedures and methodologies, including the ability to analyze security incidents, contain threats, mitigate risks, and recover from security breaches effectively and efficiently.

Education

Master s Degree (highly desirable but not required) in: Cybersecurity Information Assurance Computer Engineering Public Administration (with a cybersecurity focus)

Employment Type

Full Time

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.