Job Description
Title : Senior Threat Analyst
Duration : 2 years
Location : Brooklyn, NY
Note : Onsite role.
Job Description :
- Perform many critical functions within the Threat Management discipline including staffing 24x7x365 coverage at the City’s Security Operations Center (SOC) augmenting FTE shift schedules including days, nights, weekends, and holidays.
- Interface with OTI Cyber Command teams internally, with City agencies, vendors, and information-sharing partners.
- Monitor City networks and security alerts for intrusion, attempted compromise, and anomalous behavior; apply mitigation techniques or escalation factors;
correlate threat intelligence across various logs collected by established security controls.
- Produce routine SOC metrics & reporting.
- Maintain situation reports (SITREPS)
- Perform weekly quality control checks.
- Works closely with SOC Director on incident preparation including the continuous development of new SOC playbooks and runbooks
Required skills :
- Minimum 8 years of experience in Threat Management / SOC / Incident Response environment.
- For this senior position, leadership skills are a must, including the ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively.
- Prior experience working in a SOC environment is mandatory.
- This includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection / prevention systems (IDS / IPS), and endpoint detection and response (EDR) tools
Desirable skills / Experiences :
- Knowledge of cybersecurity principles, practices, and procedures
- Strong understanding of network and host technologies
- Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.
- Experience with SIEM technologies, malware analysis and mitigation techniques
- Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation)
- Interpret information collected by diagnostic network tools (Netflow, security event logs,IDS systems, etc.)
- Ability to investigate and solve complex problem
- Excellent communication skills are crucial for effectively communicating security incidents, risks, and recommendations to technical and non-technical stakeholders, including SOC Director and senior management.
- Threat Hunting : Proactive threat hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents.
- Incident Response : Experience in incident response procedures and methodologies,including the ability to analyze security incidents, contain threats, mitigate risks, and recover from security breaches effectively and efficiently.
If you are : bright, motivated, skilled, a difference-maker, able to get things done, work with minimum direction, enthusiastic, a thinker, able to juggle and multi-task, communicate effectively, and lead, then we would like to hear from you.
We need exceptionally capable people for this role for our client, so get back to us and tell us why you think you are a fit."
About Us :
Since 2000, Tri-Force Consulting Services ( https : / / triforce-inc.com ) has been an MBE / SDB certified IT Consulting firm in the Philadelphia region.
Tri-Force specializes in IT staffing, software development (web and mobile apps), systems integration, data analytics, system automation, cybersecurity, and cloud technology solutions for government and commercial clients.
Tri-Force works with clients to overcome obstacles such as increasing productivity, increasing efficiencies through automation, and lowering costs.
Our clients benefit from our three distinguishing core values : integrity, diligence, and technological excellence. Tri-Force is a six-time winner among the fastest-growing companies in Philadelphia and a four-time winner on the Inc.
5000 list of the nation's fastest-growing companies.
Requirements
Minimum 8 years of experience in Threat Management / SOC / Incident Response environment. For this senior position, leadership skills are a must, including the ability to lead and mentor junior analysts, coordinate team activities, and manage SOC operations effectively.
Prior experience working in a SOC environment is mandatory. This includes familiarity with SOC operations, procedures, and tools such as SIEM (Security Information and Event Management) systems, intrusion detection / prevention systems (IDS / IPS), and endpoint detection and response (EDR) tools Desirable skills / Experiences : Knowledge of cybersecurity principles, practices, and procedures Strong understanding of network and host technologies Experience applying techniques for detecting host and network-based intrusion using IDS methods and technologies.
Experience with SIEM technologies, malware analysis and mitigation techniques Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation) Interpret information collected by diagnostic network tools (Netflow, security event logs,IDS systems, etc.
Ability to investigate and solve complex problem Excellent communication skills are crucial for effectively communicating security incidents, risks, and recommendations to technical and non-technical stakeholders, including SOC Director and senior management.
Threat Hunting : Proactive threat hunting capabilities to identify and investigate potential security threats or anomalies within the environment before they escalate into incidents.
Incident Response : Experience in incident response procedures and methodologies, including the ability to analyze security incidents, contain threats, mitigate risks, and recover from security breaches effectively and efficiently