About New York City Cyber Command
Mission. NYC Cyber Command leads the City’s cyber defense efforts, working across more than 100 agencies and offices to prevent, detect, respond, and recover from cyber threats. NYC3 protects NYC infrastructure and critical systems from malicious attacks and safeguards the data, devices, and services of the City.
Culture. Foremost, we serve the people of the City of New York, so earning - and keeping - their trust is paramount. To deserve that trust, we relentlessly focus on facts, provide sound judgment, and maintain a healthy culture. We pride ourselves on having a respectful and inclusive workplace built on kindness, honest intellectual debate, and excellent work.
Job Description
Senior Threat Analysts within NYC Cyber Command perform many critical functions within the Threat Management discipline. Chief among these functions is providing 24x7x365 coverage within the Security Operations Center (SOC). For this reason, Senior Threat Analysts, must be able and willing to fill night and weekend shifts. Some of the Senior Threat Analysts tasks are described below:
● Lead SOC detection and response activities during shift
● Coordinate SOC operations with SOC Manager
● Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
● Coordinate with enterprise-wide cyber defense staff to validate network alerts.
● Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.
● Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
● Perform cyber defense trend analysis and reporting.
● Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
● Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy.
● Plan and recommend modifications or adjustments based on exercise results or system environment.
● Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
● Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity.
● Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
● Determine tactics, techniques, and procedures (TTPs) for intrusion sets.
● Examine network topologies to understand data flows through the network.
● Recommend computing environment vulnerability corrections.
● Identify and analyze anomalies in network traffic using metadata.
● Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).
● Work with stakeholders to resolve computer security incidents and vulnerability compliance.
● Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans.
Preferred Skills
● Excellent verbal and oral communication skills are required.
● Ability to analyze malware.
● Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
● Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
● Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
● Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
● Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).
Minimum Qualification Requirements
1. A baccalaureate degree from an accredited college and four years of satisfactory full‐time experience related to projects and policies required by the particular position; or,
2. Education and/or experience which is equivalent to ʺ1ʺ above.