Recent Searches

You haven't searched anything yet.

3 SOC Senior Threat Analyst Jobs in Brooklyn, NY

SET JOB ALERT
Details...
Ariel Partners
Brooklyn, NY | Contractor
$116k-143k (estimate)
3 Weeks Ago
Software People
Brooklyn, NY | Contractor
$94k-116k (estimate)
6 Days Ago
Active RPO
Brooklyn, NY | Other | Full Time | Contractor
$85k-104k (estimate)
2 Weeks Ago
SOC Senior Threat Analyst
Ariel Partners Brooklyn, NY
$116k-143k (estimate)
Contractor | IT Outsourcing & Consulting 3 Weeks Ago
Save

sadSorry! This job is no longer available. Please explore similar jobs listed on the left.

Ariel Partners is Hiring a SOC Senior Threat Analyst Near Brooklyn, NY

Note: Shift Schedule: Night shifts will typically occur between the hours of 6:00 PM and 6:00 AM. The night SOC analyst position will include weekend shifts. The position requires a total of 35 hours per week.

SCOPE OF SERVICES:

The Senior Threat Analyst position at NYC Cyber Command is mandated as part of a critical initiative due to the escalating cybersecurity threats faced by the city's infrastructure, public services, and sensitive data. In an era where cyberattacks are becoming increasingly sophisticated and prevalent, the role of a Senior Threat Analyst is paramount in fortifying the city's defenses, analyzing emerging threats, and developing proactive measures to mitigate potential risks. Failure to fill this position not only exposes NYC to heightened vulnerabilities but also jeopardizes public health and safety initiatives reliant on secure digital systems. Without this Senior Threat Analyst, the city is susceptible to data breaches, infrastructure disruptions, and potential compromise of critical services, thereby compromising the safety and well-being of its residents and visitors alike.

RESPONSIBILITY

  • Perform many critical functions within the Threat Management discipline including staffing 24x7x365 coverage at the City’s Security Operations Center (SOC) augmenting FTE shift schedules including days, nights, weekends, and holidays.
  • Interface with OTI Cyber Command teams internally, with City agencies, vendors, and information-sharing partners.
  • Monitor City networks and security alerts for intrusion, attempted compromise, and anomalous behavior; apply mitigation techniques or escalation factors; correlate threat intelligence across various logs collected by established security controls.
  • Produce routine SOC metrics & reporting.
  • Maintain situation reports (SITREPS)
  • Perform weekly quality control checks.
  • Works closely with SOC Director on incident preparation including the continuous development of new SOC playbooks and runbooks.

MANDATORY SKILLS/EXPERIENCE

Note: Candidates who do not have the mandatory skills will not be considered

  • Minimum 8 years of experience in Threat Management/SOC/Incident Response environment.
  • Ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively.
  • MUST have experience working in a SOC environment which includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools.

DESIRED SKILLS

  • Knowledge of cybersecurity principles, practices, and procedures
  • Strong understanding of network and host technologies
  • Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.
  • Experience with SIEM technologies, malware analysis and mitigation techniques
  • Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation)
  • Interpret information collected by diagnostic network tools (Netflow, security event logs, IDS systems, etc.)
  • Ability to investigate and solve complex problems.
  • Excellent communication skills are crucial for effectively communicating security incidents, risks, and recommendations to technical and non-technical stakeholders, including SOC Director and senior management.
  • Threat Hunting: Proactive threat hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents.
  • Incident Response: Experience in incident response procedures and methodologies, including the ability to analyze security incidents, contain threats, mitigate risks, and recover from security breaches effectively and efficiently.

SPECIAL REQUIREMENTS

Candidate must be willing to work days, nights and/or weekends depending on coverage or critical incident response needs

If you are interested in getting more information about this opportunity, please contact Irina Rozenberg Recruiting@arielpartners.com at your earliest convenience.

At Ariel Partners, we solve the most difficult problems that inhibit technology from enabling our customers to achieve their goals. Our vision is to be recognized by our stakeholders as an elite provider of IT solutions, so when they have their biggest challenges, we are on their short list. We are looking for team members who share our values of: Integrity to do the right thing even when it hurts; Commitment to the long-term success and happiness of our customers, our people, and our partners; Courage to take on difficult challenges, accept new ideas, and accept incremental failure; and the constant pursuit of Excellence. Ariel Partners is an Equal Opportunity Employer in accordance with federal, state, and local laws.

Job Summary

JOB TYPE

Contractor

INDUSTRY

IT Outsourcing & Consulting

SALARY

$116k-143k (estimate)

POST DATE

05/24/2024

EXPIRATION DATE

05/30/2024

WEBSITE

arielpartners.com

HEADQUARTERS

MANHATTAN, NY

SIZE

<25

FOUNDED

2000

CEO

SHILPA STRONG

REVENUE

<$5M

INDUSTRY

IT Outsourcing & Consulting

Show more

Ariel Partners
Contractor
$128k-155k (estimate)
1 Week Ago
Ariel Partners
Contractor
$99k-122k (estimate)
1 Week Ago
Ariel Partners
Full Time
$77k-99k (estimate)
3 Weeks Ago