NYC Agency Location
24 Months Work Hours 24 Months Work Hours Duration Night shifts will typically occur between the hours of 6
Job Description:
· The Senior Threat Analyst position at NYC Cyber Command is mandated as part of a critical initiative due to the escalating cybersecurity threats faced by the city's infrastructure, public services, and sensitive data.
· In an era where cyberattacks are becoming increasingly sophisticated and prevalent, the role of a Senior Threat Analyst is paramount in fortifying the city's defences, analyzing emerging threats, and developing proactive measures to mitigate potential risks.
· Failure to fill this position not only exposes NYC to heightened vulnerabilities but also jeopardizes public health and safety initiatives reliant on secure digital systems.
· Without this Senior Threat Analyst, the city is susceptible to data breaches, infrastructure disruptions, and potential compromise of critical services, thereby compromising the safety and well-being of its residents and visitors alike.
Requirements:
· Minimum 8 years of experience in Threat Management/SOC/Incident Response environment.
· For a senior position, leadership this includes the ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively.
· Prior experience working in a SOC environment is mandatory.
· This includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools.
· Knowledge of cybersecurity principles, practices, and procedures
· Strong understanding of network and host technologies
· Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.
· Experience with SIEM technologies, malware analysis and mitigation techniques
· Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation)
· Interpret information collected by diagnostic network tools (Netflow, security event logs, IDS systems, etc.)
· Ability to investigate and solve complex problems.
· Excellent communication skills are crucial for effectively communicating security incidents, risks, and recommendations to technical and non-technical stakeholders, including SOC Director and senior management.
· Minimum 8 years of experience in Threat Management/SOC/Incident Response environment.
· For a senior position, leadership this includes the ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively.
· Prior experience working in a SOC environment is mandatory.
· This includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools.
· Knowledge of cybersecurity principles, practices, and procedures
· Strong understanding of network and host technologies
· Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.
· Experience with SIEM technologies, malware analysis and mitigation techniques
· Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation)
· Interpret information collected by diagnostic network tools (Netflow, security event logs, IDS systems, etc.)
· Ability to investigate and solve complex problems.
· Excellent communication skills are crucial for effectively communicating security incidents, risks, and recommendations to technical and non-technical stakeholders, including SOC Director and senior management.
Requirements Proactive threat hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents.· Minimum 8 years of experience in Threat Management/SOC/Incident Response environment.
· For a senior position, leadership this includes the ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively.
· Prior experience working in a SOC environment is mandatory.
· This includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools.
· Knowledge of cybersecurity principles, practices, and procedures
· Strong understanding of network and host technologies
· Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.
· Experience with SIEM technologies, malware analysis and mitigation techniques
· Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation)
· Interpret information collected by diagnostic network tools (Netflow, security event logs, IDS systems, etc.)
· Ability to investigate and solve complex problems.
· Excellent communication skills are crucial for effectively communicating security incidents, risks, and recommendations to technical and non-technical stakeholders, including SOC Director and senior management.
Requirements Proactive threat hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents. Requirements Experience in incident response procedures and methodologies, including the ability to analyze security incidents, contain threats, mitigate risks, and recover from security breaches effectively and efficiently.