MTA - New York, NY

posted 15 days ago

Full-time - Mid Level
New York, NY
Professional, Scientific, and Technical Services

About the position

The Cybersecurity Analyst SOC Levels 3-5 position at MTA is designed to provide critical technical expertise in detecting, analyzing, and responding to cybersecurity events. The role involves 24/7 monitoring and intrusion detection, utilizing various technology and analytic tools to protect the MTA from cybersecurity threats. Analysts will collaborate with security engineers and other stakeholders to enhance the overall security posture of the organization, focusing on specific domains within cybersecurity.

Responsibilities

  • Conducts security monitoring and intrusion detection analysis using various technology and analytic tools.
  • Correlates events and activities across systems to identify trends of unauthorized use.
  • Reviews alerts and data from sensors and documents formal, technical incident reports.
  • Tests new systems and manages cybersecurity risks and remediation through analysis.
  • Responds to computer security incidents according to the incident response policy and procedures.
  • Provides technical guidance to first responders for handling information security incidents.
  • Provides timely and relevant updates to appropriate stakeholders and decision makers.
  • Communicates investigation findings to relevant business units to help improve the information security posture.
  • Validates and maintains incident response plans and processes to address potential threats.
  • Compiles and analyzes data for management reporting and metrics.
  • Monitors relevant information sources to stay up to date on current attacks and trends.
  • Analyzes potential impact of new threats and communicates risks back to detection engineering functions.
  • Performs root-cause analysis to document findings and participate in root-cause elimination activities as required.
  • Works with data sets to identify patterns.
  • Understands data automation and analysis techniques.
  • Uses judgment to form conclusions that may challenge conventional wisdom.
  • Anticipates new threats and indicators of compromise.
  • Hypothesizes new threats and indicators of compromise.
  • Monitors threat intelligence feeds to identify a range of threats, including indicators of compromise and advanced persistent threats (APTs).
  • Identifies the tactics, techniques, and procedures (TTPs) of potential threats through the MITRE ATT&CK or similar frameworks.
  • Participates in the creation of enterprise security documents under the direction of the IT Security Manager.
  • Performs contract management and supply management functions appropriate to reduce security risks.

Requirements

  • Bachelor's degree in computer science or related fields, or equivalent experience.
  • 2+ years of relevant experience for Level 3; 3+ years for Level 4; 5+ years for Level 5.
  • Understanding of Operating Systems and Hardware.
  • Advanced understanding of TCP/IP and Internet technologies required.
  • Scripting or programming skills (PERL, Python, PowerShell) preferred.
  • CISSP or other advanced security-related certification preferred but not required.

Nice-to-haves

  • Certifications in technology subdomains (Cloud, Applications, Infrastructure, Security Technology) preferred but not required.
  • Experience in a specific cybersecurity subdomain is preferred.

Benefits

  • Eligible for telework (2 days per week).
  • Competitive salary based on level.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service