Overview

Senior Threat Analyst Jobs in Brooklyn, New York, USA at Current Openings

Title: Senior Threat Analyst

Company: Current Openings

Location: Brooklyn, New York, USA

Type: Full Time

Category: IT/Tech, Security

A NYC agency located in Brooklyn, NY is looking for a Senior Threat Analyst to support their Security Operations Center.

Work Mode: onsite work in Brooklyn. Night shifts will typically occur between the hours of 6:00 PM and 6:00 AM. The night SOC analyst position will include weekend shifts as well. The position requires a total of 35 hours per week.

Pay Rate Range: $67.00 – $74.00 (based on experience)

Job Description:

• Perform many critical functions within the Threat Management discipline including staffing 24x7x365 coverage at the City’s Security Operations Center (SOC) augmenting FTE shift schedules including days, nights, weekends, and holidays.

• Interface with Cyber teams internally, with various City agencies, vendors, and information-sharing partners.

• Monitor City networks and security alerts for intrusion, attempted compromise, and anomalous behavior; apply mitigation techniques or escalation factors; correlate threat intelligence across various logs collected by established security controls.

• Produce routine SOC metrics & reporting.

• Maintain situation reports (SITREPS)

• Perform weeklyquality controlchecks.

• Works closely with SOC Director on incident preparation including the continuous development of new SOC playbooks and runbooks.

Mandatory Skills & Experience:

• Candidate must be willing to work days, nights and/or weekends depending on coverage or critical incident response needs

• Minimum 8 years of experience in Threat Management/SOC/Incident Response environment.

• For this senior position,leadershipskills are a must, including the ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively.

• Prior experience working in a SOC environment is mandatory. This includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection/preventionsystems (IDS/IPS), and endpoint detection and response (EDR) tools.

Desirable Skills and Experience:

• Knowledge of cybersecurity principles, practices, and procedures

• Strong understanding of network and host technologies

• Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.

• Experience with SIEM technologies, malware analysis and mitigation techniques

• Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation)

• Interpret information collected by diagnostic network tools (Netflow, security event logs, IDS systems, etc.)

• Ability to investigate and solve complex problems.

• Excellentcommunication skillsare crucial for effectively communicating security incidents, risks, and recommendations to technical and non-technical stakeholders, including SOC Director andsenior management.

• Threat Hunting:
Proactive threat hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents.

• Incident Response:
Experience in incident response procedures and methodologies, including the ability to analyze security incidents, contain threats, mitigate risks, and recover from security breaches effectively and efficiently.

 

Upload your CV/resume or any other relevant file. Max. file size: 800 MB.