Title: SOC (Security Operations Center) Senior Threat Analyst
Location: Brooklyn NY Onsite
Duration: 24 Months
Work Hours: 35hrs/week
Shift Schedule: Night shifts will typically occur between the hours of 6:00 PM and 6:00 AM. The night SOC analyst position will include weekend shifts. The position requires a total of 35 hours per week.
Job Description
- The Senior Threat Analyst position at NYC Cyber Command is mandated as part of a critical initiative due to the escalating cybersecurity threats faced by the citys infrastructure public services and sensitive data.
- In an era where cyberattacks are becoming increasingly sophisticated and prevalent the role of a Senior Threat Analyst is paramount in fortifying the citys defences analyzing emerging threats and developing proactive measures to mitigate potential risks.
- Failure to fill this position not only exposes NYC to heightened vulnerabilities but also jeopardizes public health and safety initiatives reliant on secure digital systems.
- Without this Senior Threat Analyst the city is susceptible to data breaches infrastructure disruptions and potential compromise of critical services thereby compromising the safety and well-being of its residents and visitors alike.
Mandatory Skills
- Minimum 8 years of experience in Threat Management/SOC/Incident Response environment.
- For a senior position leadership this includes the ability to lead and mentor junior analysts coordinate team activities and manage SOC operations effectively.
- Prior experience working in a SOC environment is mandatory.
- This includes familiarity with SOC operations procedures and tools such as SIEM (Security Information and Event Management) systems intrusion detection/prevention systems (IDS/IPS) and endpoint detection and response (EDR) tools.
Desirable skills
- Knowledge of cybersecurity principles practices and procedures
- Strong understanding of network and host technologies
- Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.
- Experience with SIEM technologies malware analysis and mitigation techniques
- Apply cybersecurity and privacy principles to organizational requirements (confidentiality integrity availability authentication non-repudiation)
- Interpret information collected by diagnostic network tools (Netflow security event logs IDS systems etc.)
- Ability to investigate and solve complex problems.
- Excellent communication skills are crucial for effectively communicating security incidents risks and recommendations to technical and non-technical stakeholders including SOC Director and senior management.
- Threat Hunting: Proactive threat hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents.
- Incident Response: Experience in incident response procedures and methodologies including the ability to analyze security incidents contain threats mitigate risks and recover from security breaches effectively and efficiently.