Cybersecurity Analyst SOC Levels 3
Description
Job Information
Job Title: Cybersecurity Analyst SOC Levels 3
Salary Range: Level 3: $95,929 - $127,050
POINTS: Level 3 - 393
DEPT/DIV: MTA Information Technology/ Office of IT Cyber Security Services
SUPERVISOR: Cyber Security Officer, Monitoring
LOCATION: 2 Broadway, New York, NY 10004
HOURS OF WORK: 12:00am – 8:30am (7.5hours/day)
8:00am – 4:30pm (7.5hours/day)
3:30pm – 12:00am (7.5hours/day)
This Job will close on 11.29.2024
This position is eligible for telework which is currently 2 days per week. New Hires are eligible to apply 30 days after their effective date of hire.
Summary
The purpose of this position is to provide critical technical expertise in the detection, analysis and response to cybersecurity events. Cybersecurity Analyst will be responsible for early and accurate detection, prevention response, containment, and guidance to remediation of threats directed against the MTA on a 24/7 basis. The analysis is conducted through technology risk assessments, data analytics tools, business processes reviews and collaborate with security engineers, architects, developers, vendors, business units to constantly improve the overall security of the MTA. The cybersecurity analyst will focus on specific domains and specialties within cybersecurity with a great degree of specialty to detect, protect and advise the organization proactively and reactively.
The Cybersecurity Analyst will be a member of the Cyber Security Operation Center “CSOC”. This role will conduct real-time 24/7 security monitoring and intrusion detection analysis using a Security Incident & Event Management system “SIEM” along with various technology and analytic tools, such as web and next generation firewalls, machine and human behavior learning tools, host-based security system, security event and incident monitoring systems, virtual, physical, and cloud platforms, user endpoint (laptop, desktop, mobile, and internet of things/IOT) systems, etc. The Analyst will research emerging threats and vulnerabilities to aid in the identification and analysis of network incidents, and supports the creation or improvement of security controls, policies, standards, and guidance to address them.
Desired Skills
- Ability to perform analysis and remediation actions on threats from various attack vectors such as: malware, viruses, ransomware, phishing, SQL Injection, compromised credentials, DDOS etc.
- Ability to provide incident response support
- Ability to mitigate actions to contain activity
- Ability to facility forensic analysis
Responsibilities:
- Researching emerging threats and vulnerabilities to aid in the identification of network incidents, and supports the creation of new architecture, policies, standards, and guidance to address them
- Provide incident response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary
- Conducts security monitoring and intrusion detection analysis using various technology and analytic tools, such as web and next generation firewalls, machine and human behavior learning tools, host-based security system, security event and incident monitoring systems, virtual, physical, and cloud platforms, user endpoint (laptop, desktop, mobile, and internet of things/IOT) systems, etc.
- Correlates events and activities across systems to identify trends of unauthorized use
- Reviews alerts and data from sensors and documents formal, technical incident reports
- Tests new systems and manage cybersecurity risks and remediation through analysis
- Responds to computer security incidents according to the computer security incident response policy and procedures
- Provides technical guidance to first responders for handling information security incidents
- Provides timely and relevant updates to appropriate stakeholders and decision makers
- Communicates investigation findings to relevant business units to help improve the information security posture
- Validates and maintains incident response plans and processes to address potential threats
- Compiles and analyzes data for management reporting and metrics
- Monitors relevant information sources to stay up to date on current attacks and trends
- Analyzes potential impact of new threats and communicates risks back to detection engineering functions
- Performs root-cause analysis to document findings, and participate in root-cause elimination activities as required
- Works with data sets to identify patterns
- Understands data automation and analysis techniques
- Uses judgment to form conclusions that may challenge conventional wisdom
- Hypothesizes new threats and indicators of compromise
- Monitors threat intelligence feeds to identify a range of threats, including indicators of compromise and advanced persistent threats (APTs)
- Identifies the tactics, techniques and procedures (TTPs) of potential threats through the MITRE ATT&CK or similar frameworks
- Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate.
- Perform Contract management and supply management functions appropriate to reduce security risks
The role will provide a proactive approach to cybersecurity while also performing investigation of security incidents related to MTA operations related to Cyber Security.
Level 3
- Provides proactive monitoring and analysis for a domain of the cybersecurity to ensure systems security baseline targets are met.
- Implements changes to one or more cybersecurity related domain technologies, executing tests and reporting on security baselines, violations/anomalies, to meet requested needs.
- Troubleshoot and investigate cybersecurity incidents and issues by analyzing a chain of events and applying technical knowledge following established procedures and standards to resolve immediate customer needs.
- Maintains and updates existing documentation and standard operating procedures to ensure accurate and timely information is available for assigned systems.
- Works with more experienced colleagues and other IT technical resources to improve coordination of cybersecurity requirements and analyze issues as they arise
- Participate in the evaluation of new products and technologies, under the direction and guidance of senior colleagues, relevant to assigned cybersecurity area to enhance cybersecurity posture and reduce risk to the MTA while achieving objectives.
- Performs other duties and tasks as assigned.
- Observing the work performed by the contractor.
- Reviewing invoices and approving them if the work has contractual standards.
- Addressing performance issues with the contractor when possible.
- Escalating issues to other parties as needed.
Education & Experience
Level 3
- Bachelor’s Degree and minimum 1 year of relevant experience. An equivalent combination of education and experience may be considered in lieu of a degree.
- Bachelor’s degree in Computer Science or related fields preferred.
- CISSP or other advanced security-related certification preferred but not required.
- Certifications in technology subdomains preferred but not required (ie. Cloud, Applications, Infrastructure, Security Technology, etc.)
- Requires prior experience with installing, maintaining and troubleshooting technology systems.
- Proven ability to troubleshoot and support technical issues using standardized procedures.
- Proven ability to analyze a security risk assessment or conduct one with guidance
- Understanding of Operating Systems and Hardware
- Understanding of TCP/IP (OSI Layers 1– 4) and Internet and Intranet technologies required (OSI Layers 5-7) required.
- Scripting or programming skills (PERL, Python, PowerShell, etc.) preferred as needed.
- 1 year of experience in a specific (Cloud, Applications, Infrastructure, Security Technology, etc.) cybersecurity subdomain is preferred
Competencies:
Management Level | Proficiency Level | Standard Competencies | ||
Level 3 | Adept | Values Diversity Collaborates | ||
Capable | Cultivates Innovation | |||
Customer Focus | ||||
Communicates Effectively | ||||
Fundamental Awareness | Tech Savvy | |||
Technical Skills |
General:
• May need to work outside of normal work hours (i.e., evenings and weekends)
• Travel may be required to other MTA locations or other external sites
• May need to work outside of normal work hours (i.e., evenings and weekends)
• Travel may be required to other MTA locations or other external sites
Other Information
Please be advised that pursuant to MTA Code of Ethics and New York State Ethics Law, you have been designated as a policy maker. Therefore, you will be required to file an annual financial disclosure statement with the Commission on Ethics and Lobbying in Government. The Commission will notify you of this filing requirement via your work email. Upon receipt of notification from the Commission you will have 30 days to complete your financial disclosure statement.
Equal Employment Opportunity
MTA and its subsidiary and affiliated agencies are Equal Opportunity Employers, including with respect to veteran status and individuals with disabilities.
The MTA encourages qualified applicants from diverse backgrounds, experiences, and abilities, including military service members, to apply.