You haven't searched anything yet.
The New York City Department of Health and Mental Hygiene (DOHMH) is the nation's leading public health agency protecting and promoting health of all New Yorkers. Our 7,000-plus team members bring an extraordinary array of languages, cultures, and experiences to bear on the work of public health. Our diversity fuels creativity because all perspectives are heard and valued. DOHMH aims to improve the health outcomes of all New Yorkers by centering persistent racial inequities and promotion of social justice at the core of its work. The Division of Information Technology’s mission and vision is to promote and protect the health of all New Yorkers through the use of innovative technology and health information that is useful and available, such that we envision a city where all New Yorkers can realize their full health potential, regardless of who they are, where they are from or where they live.
The Division of Information Technology aims to align technology solutions with the DOHMH mission by prioritizing resource use and deploying innovations that facilitate the agency’s day-to-day activities and enhance staff productivity and efficiency. Our goal is to provide users with a reliable, stable, and safe computing environment, through the collaboration of the Bureau of Technology Strategy & Project Management provides business analysis and IT project management services to define and deliver IT solutions that meet all program needs.
**This a grant-funded W-2 position with full employment benefits that expires 6/30/2025 (possibility for extension) hired through the Fund for Public Health New York and will be assigned to NYC DOHMH. Only those with authorization to work in the U.S. without sponsorship should apply. This is an on-site position, no remote or hybrid option available. Professional references are required. **
RESPONSIBILITIES
· Monitor and analyze security alerts and events to identify potential security incidents.
· Investigate and triage security incidents to determine the scope, impact, and root cause.
· Coordinate with internal stakeholders to contain and remediate security incidents effectively.
· Conduct post-incident analysis and provide recommendations for enhancing security controls and preventing future incidents.
· Stay informed about the latest cybersecurity threats, vulnerabilities, and industry best practices.
· Participate in tabletop exercises and security drills to test incident response procedures and improve readiness.
· Analyze scan results and prioritize vulnerabilities based on severity, business impact, and exploitability.
· Collaborate with system administrators, developers, and stakeholders to remediate identified vulnerabilities in a timely manner.
· Stay informed about the latest security vulnerabilities, exploits, and mitigation techniques through research, industry publications, and participation in relevant forums and conferences.
· Communicate effectively with executive leadership, technical teams, and other stakeholders to provide regular updates on the status of vulnerability management efforts.
· Developing playbooks from a list of steps needed to complete a task
QUALIFICATIONS
· Strong understanding of network security principles, technologies, vulnerability assessment methodologies, and protocols.
· Strong understanding of common vulnerabilities and exposure (CVE) database and vulnerability assessment methodologies.
· Being familiar in using security tools and technologies for monitoring, detection, and analysis (e.g., SIEM, IDS/IPS, EDR).
· Familiarity with web application scanning tools
· Knowledge of scripting languages such as Python, SQL, etc.
· Understanding of different types of database platforms (e.g., MySQL, PostgreSQL, Oracle)
· Proficiency in vulnerability scanning tools and technologies (e.g., Nessus, Qualys, Rapid7).
· Knowledge of incident response frameworks and methodologies (e.g., NIST, SANS).
· Excellent analytical and problem-solving skills with the ability to prioritize and respond to security incidents, as well as remediate vulnerabilities effectively.
· Effective communication and interpersonal skills with the ability to collaborate with diverse teams and stakeholders.
· Relevant certifications such as CISSP, GIAC, CISM or CISA are preferred.
· Experience with vulnerability management frameworks and standards (e.g., CVSS, OWASP, CIS).
Job Type: Full-time
Pay: $75,000.00 - $90,000.00 per year
Benefits:
Schedule:
Experience:
Work Location: In person
Full Time
$83k-103k (estimate)
03/18/2024
06/14/2024
The job skills required for Incident Response Analyst include Analysis, Incident Response, Information Security, Cybersecurity, SIEM, Leadership, etc. Having related job skills and expertise will give you an advantage when applying to be an Incident Response Analyst. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Incident Response Analyst. Select any job title you are interested in and start to search job requirements.
The following is the career advancement route for Incident Response Analyst positions, which can be used as a reference in future career path planning. As an Incident Response Analyst, it can be promoted into senior positions as a Cyber Incident Response Specialist II that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Incident Response Analyst. You can explore the career advancement for an Incident Response Analyst below and select your interested title to get hiring information.