image
  • Snapboard
  • Activity
  • Reports
  • Campaign
Welcome ,
loadingbar
Loading, Please wait..!!

Soc Cyber Security Analyst Brooklyn Ny

  • ... Posted on: Sep 17, 2024
  • ... Software People Inc
  • ... Brooklyn Hgts, New York
  • ... Salary: Not Available
  • ... CTC

Soc Cyber Security Analyst Brooklyn Ny   

Job Title :

Soc Cyber Security Analyst Brooklyn Ny

Job Type :

CTC

Job Location :

Brooklyn Hgts New York United States

Remote :

No

Jobcon Logo Job Description :

Please Let me know your Interest in this position.

In person interview needed.

Location: Brooklyn, NY 11201

Duration: 12+ months (35 hrs/week)

Onsite from day 1

***Candidate must be willing to work days, nights and/or weekends depending on coverage or critical incident response needs***

Scheduled Work Hours:

Night SOC Analyst Hours:

Shift Schedule: Night shifts will typically occur between the hours of 6:00 PM and 6:00 AM. The night SOC analyst position will include weekend shifts. The position requires a total of 35 hours per week.

Night Shifts / Weekend Shifts (not including a mandatory unpaid meal break after 6 hours of work), 35 work hours per week. If the consultant works more than 35 hours per week, the consultant must request overtime in the Agency's timekeeping system and the project manager must approve those hours worked above the weekly maximum.

Responsibilities

  • Perform many critical functions within the Threat Management discipline including staffing 24x7x365 coverage at the Security Operations Center (SOC) and augmenting FTE shift schedules including days, nights, weekends, and holidays.
  • Interface with Cyber Command teams internally, with agencies, vendors, and information-sharing partners.
  • Monitor networks and security alerts for intrusion, attempted compromise, and anomalous behavior; apply mitigation techniques or escalation factors; correlate threat intelligence across various logs collected by established security controls.
  • Produce routine SOC metrics & reporting.
  • Maintain situation reports (SITREPS)
  • Perform weekly quality control checks.
  • Works closely with SOC Director on incident preparation including the continuous development of new SOC playbooks and runbooks.

Skills Needed

  • Minimum 8 years of experience in Threat Management/SOC/Incident Response environment.
  • For this senior position, leadership skills are a must, including the ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively.
  • Prior experience working in a SOC environment is mandatory. This includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools.
  • Knowledge of cybersecurity principles, practices, and procedures
  • Strong understanding of network and host technologies
  • Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.
  • Experience with SIEM technologies, malware analysis, and mitigation techniques
  • Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation)
  • Interpret information collected by diagnostic network tools (NetFlow, security event logs, IDS systems, etc.)
  • Ability to investigate and solve complex problems.
  • Excellent communication skills are crucial for effectively communicating security incidents, risks, and recommendations to technical and non-technical stakeholders, including SOC Director and senior management.
  • Threat Hunting: Proactive threat-hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents.
  • Incident Response: Experience in incident response procedures and methodologies, including the ability to analyze security incidents, contain threats, mitigate risks, and recover from security breaches effectively and efficiently.

Jobcon Logo Position Details

Posted:

Sep 17, 2024

Employment:

CTC

Salary:

Not Available

Snaprecruit ID:

SD-CIE-ccd0cbd3c6c7a8fcf5dc69933134bc4cb74ef41b807ce1f05e90ab3e131a062e

City:

Brooklyn Hgts

Job Origin:

CIEPAL_ORGANIC_FEED

Share this job:

  • linkedin

Jobcon Logo
A job sourcing event
In Dallas Fort Worth
Aug 19, 2017 9am-6pm
All job seekers welcome!

Soc Cyber Security Analyst Brooklyn Ny    Apply

Click on the below icons to share this job to Linkedin, Twitter!

Please Let me know your Interest in this position.

In person interview needed.

Location: Brooklyn, NY 11201

Duration: 12+ months (35 hrs/week)

Onsite from day 1

***Candidate must be willing to work days, nights and/or weekends depending on coverage or critical incident response needs***

Scheduled Work Hours:

Night SOC Analyst Hours:

Shift Schedule: Night shifts will typically occur between the hours of 6:00 PM and 6:00 AM. The night SOC analyst position will include weekend shifts. The position requires a total of 35 hours per week.

Night Shifts / Weekend Shifts (not including a mandatory unpaid meal break after 6 hours of work), 35 work hours per week. If the consultant works more than 35 hours per week, the consultant must request overtime in the Agency's timekeeping system and the project manager must approve those hours worked above the weekly maximum.

Responsibilities

  • Perform many critical functions within the Threat Management discipline including staffing 24x7x365 coverage at the Security Operations Center (SOC) and augmenting FTE shift schedules including days, nights, weekends, and holidays.
  • Interface with Cyber Command teams internally, with agencies, vendors, and information-sharing partners.
  • Monitor networks and security alerts for intrusion, attempted compromise, and anomalous behavior; apply mitigation techniques or escalation factors; correlate threat intelligence across various logs collected by established security controls.
  • Produce routine SOC metrics & reporting.
  • Maintain situation reports (SITREPS)
  • Perform weekly quality control checks.
  • Works closely with SOC Director on incident preparation including the continuous development of new SOC playbooks and runbooks.

Skills Needed

  • Minimum 8 years of experience in Threat Management/SOC/Incident Response environment.
  • For this senior position, leadership skills are a must, including the ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively.
  • Prior experience working in a SOC environment is mandatory. This includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) tools.
  • Knowledge of cybersecurity principles, practices, and procedures
  • Strong understanding of network and host technologies
  • Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.
  • Experience with SIEM technologies, malware analysis, and mitigation techniques
  • Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation)
  • Interpret information collected by diagnostic network tools (NetFlow, security event logs, IDS systems, etc.)
  • Ability to investigate and solve complex problems.
  • Excellent communication skills are crucial for effectively communicating security incidents, risks, and recommendations to technical and non-technical stakeholders, including SOC Director and senior management.
  • Threat Hunting: Proactive threat-hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents.
  • Incident Response: Experience in incident response procedures and methodologies, including the ability to analyze security incidents, contain threats, mitigate risks, and recover from security breaches effectively and efficiently.

Loading
Please wait..!!