Epicareer Might not Working Properly
Learn More
T

Senior Threat Analyst - Onsite Brooklyn, NY

Salary undisclosed

Apply on

Availability Status

This job is expected to be in high demand and may close soon. We’ll remove this job ad once it's closed.


Original
Simplified

Role: Senior Threat Analyst 2

Location: Brooklyn, NY

Shift: Night Shift (6 PM to 6 AM and Weekend Shift)

Duration: 2 years

Responsibilities:

  • Perform many critical functions within the Threat Management discipline including staffing 24x7x365 coverage at the City s Security Operations Center (SOC) augmenting FTE shift schedules including days, nights, weekends, and holidays.
  • Interface with OTI Cyber Command teams internally, with City agencies, vendors, and information-sharing partners.
  • Monitor City networks and security alerts for intrusion, attempted compromise, and anomalous behavior; apply mitigation techniques or escalation factors; correlate threat intelligence across various logs collected by established security controls.
  • Produce routine SOC metrics & reporting.
  • Maintain situation reports (SITREPS)
  • Perform weekly quality control checks.
  • Works closely with SOC Director on incident preparation including the continuous development of new SOC playbooks and runbooks.

Mandatory Qualifications:

  • Minimum 8 years of experience in Threat Management/SOC/Incident Response environment.
  • For this senior position, leadership skills are a must, including the ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively.
  • Prior experience working in a SOC environment is mandatory. This includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools.
  • Knowledge of cybersecurity principles, practices, and procedures
  • Strong understanding of network and host technologies
  • Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.
  • Experience with SIEM technologies, malware analysis and mitigation techniques
  • Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation)
  • Interpret information collected by diagnostic network tools (Netflow, security event logs, IDS systems, etc.)
  • Ability to investigate and solve complex problems.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job