Home

Senior Threat Analyst (SOC) (Need Local only with LinkedIn) at Remote, Remote, USA
Email: [email protected]
From:

Prabhat,

VYZEINC

[email protected]

Reply to:   [email protected]

Job Description -

Senior Threat Analyst (SOC) (Need Local only with LinkedIn)

Onsite (Brooklyn, NY)

Skype

Shift Schedule: Night shifts will typically occur between the hours of 6:00 PM and 6:00 AM. The night SOC analyst position will include weekend shifts. The position requires a total of 35 hours per week

Perform many critical functions within the Threat Management discipline including staffing 24x7x365 coverage at the Citys Security Operations Center (SOC) augmenting FTE shift schedules including days, nights, weekends, and holidays.

Interface with OTI Cyber Command teams internally, with City agencies, vendors, and information-sharing partners.

Monitor City networks and security alerts for intrusion, attempted compromise, and anomalous behaviour; apply mitigation techniques or escalation factors; correlate threat intelligence across various logs collected by established security controls.
Produce routine SOC metrics & reporting.
Maintain situation reports (SITREPS)
Perform weekly quality control checks.
Works closely with SOC Director on incident preparation including the continuous development of new SOC playbooks and runbooks.

MANDATORY SKILLS/EXPERIENCE Note:
Minimum 10 years of experience in Threat Management/SOC/Incident Response environment.
For this senior position, leadership skills are a must, including the ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively.
Prior experience working in a SOC environment is mandatory. This includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools.
Knowledge of cybersecurity principles, practices, and procedures
Strong understanding of network and host technologies
Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.
Experience with SIEM technologies, malware analysis and mitigation techniques
Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation)
Interpret information collected by diagnostic network tools (NetFlow, security event logs, IDS systems, etc.)
Ability to investigate and solve complex problems.
Excellent communication skills are crucial for effectively communicating security incidents, risks, and recommendations to technical and non-technical stakeholders, including SOC Director and senior management.
Threat Hunting: Proactive threat hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents.
Incident Response: Experience in incident response procedures and methodologies, including the ability to analyze security incidents, contain threats, mitigate risks, and recover from security breaches effectively and efficient

Keywords: access management New York
Senior Threat Analyst (SOC) (Need Local only with LinkedIn)
[email protected]
[email protected]
View all
Fri Sep 13 04:30:00 UTC 2024

To remove this job post send "job_kill 1746983" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 1

Location: ,