Please scroll down, To apply

Sr. Threat Analyst 2 (Nights/Weekends)

hiring now

IS3 Solutions

2024-10-02 17:43:15

Job location Brooklyn, New York, United States

Job type: fulltime

Job industry: Administration

Job description

We are in search of a a Senior Threat Analyst to fortify the defenses of a Command Center. They will analyze emerging threats, and develop proactive measures to mitigate potential risks.

SCOPE OF SERVICES TASKS:

Perform many critical functions within the Threat Management discipline including staffing24x7x365 coverage at the City's Security Operations Center (SOC) augmenting FTE shiftschedules including days, nights, weekends, and holidays.

Interface with Cyber Command teams internally, with outside agencies, vendors, and information-sharing partners.

Monitor networks and security alerts for intrusion, attempted compromise, andanomalous behavior; apply mitigation techniques or escalation factors; correlate threatintelligence across various logs collected by established security controls.

Produce routine SOC metrics & reporting.

Maintain situation reports (SITREPS)

Perform weekly quality control checks.

Works closely with SOC Director on incident preparation including the continuousdevelopment of new SOC playbooks and runbooks.

SKILLS/EXPERIENCE:

Minimum 8 years of experience in Threat Management/SOC/Incident Response environment.

For this senior position, leadership skills are a must, including the ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively.

Prior experience working in a SOC environment is mandatory. This includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools.

Knowledge of cybersecurity principles, practices, and procedures

Strong understanding of network and host technologies

Experience applying techniques for detecting host and network-based intrusion using IDSmethods and technologies.

Experience with SIEM technologies, malware analysis and mitigation techniques

Apply cybersecurity and privacy principles to organizational requirements (confidentiality,integrity, availability, authentication, non-repudiation)

Interpret information collected by diagnostic network tools (Netflow, security event logs,IDS systems, etc.)

Ability to investigate and solve complex problems.

Inform a friend!

<!– job description page –>
Top