Senior Cybersecurity SOC Analyst

Overview

On Site
USD 123,053.00 - 145,243.00 per year
Full Time

Skills

IoT
Attention to detail
Information Technology
Cyber security
Physical security
Real-time
Data Analysis
Artificial intelligence
Machine Learning (ML)
Business process
Intrusion detection
System security
Incident management
IT management
IT security
Information security
Management reporting
Threat analysis
Contract management
Supply management
Information assurance
Information systems
Endpoint protection
Active listening
Customer service
Problem solving
Critical thinking
Decision-making
Goal oriented
Customer relationship management
Customer focus
System on a chip
Project management
Telecommuting
MTA
Transportation
Network
Finance
SAP BASIS
Operations
SIEM
Collaboration
FOCUS
Analytical skill
Firewall
Cloud computing
Laptop
Facilitation
Forensics
Roadmaps
Documentation
Testing
Research
IMPACT
Evaluation
Data
Planning
Reporting
Coaching
Workflow
Sensors
Policies
Metrics
Orchestration
Automation
Mentorship
Budget
Management
Invoices
CISSP
CISM
ISACA
CISA
WAF
Communication
Switches
Writing
Partnership
Innovation
Law
FDS
Military

Job Details

Description

JOB TITLE: Senior Cybersecurity SOC Analyst
SALARY RANGE: $123,053 - $145,243
HAY POINTS: 551
DEPT/DIV: Information Technology / Cybersecurity
SUPERVISOR: Cybersecurity Director, IT Cyber Security
LOCATION: Vario 2 Broadway New York, NY 10004
HOURS OF WORK: 12:00am - 8:30am (7.5hrs) 8:00am - 4:30pm (7.5hrs) 3:30pm - 12:00am (7.5hrs) or as required)

This position is eligible for telework which is currently two day per week. New hires are eligible to apply 30 days after their effective date of hire.

About us:

The MTA transportation network has very large systems and infrastructure for financial, business, automated train, transportation, power, and physical security. The MTA IT Department is centrally responsible for providing a full range of Information and Operational Technology services to the MTA agencies and administrative units through its operating and support units. Services are provided on a 7/24/365 basis in support of the MTA organization and its ridership.

The MTA IT Cybersecurity organization, is responsible for identifying, developing, implementing, and integrating cybersecurity-related processes internal and third-party supplier organizations to reduce the operational risks, reputational risks and financial risks. The organization also has robust cybersecurity operations functions designed to protect the MTA in real-time on a 7/24/365 basis.

Summary of Job

This role plays a vital part in upholding the overall security stance of the MTA's Information Technology (IT)/ Operational Technology (OT) infrastructure by reviewing cybersecurity alerts and events that occur within the security stack on a continuous basis as part of a 7/24/365 security monitoring operation (SOC) identifying suspicioanomalous activities, vulnerabilities and potential threats across various attack vectors, escalating incidents, and recommending or deploying mitigation tactics.

The main objective of a SOC analyst is to identify, analyze, and escalate alerts and events to safeguard the MTA's Information Technology (IT)/ Operational Technology (OT) critical infrastructure and sensitive information from potential cyber threats by cybercriminals or malicious insiders. Analysis is conducted through the utilization of multiple data analytics tools, such as SIEM, UEBA and Artificial Intelligence (AI)/Machine learning technologies, business processes reviews and collaborate with security engineers, architects, developers, vendors, business units to constantly improve the overall security posture of the MTA. The cybersecurity analyst will focus on specific domains and specialties within cybersecurity with a great degree of specialty to detect, protect and advise the organization proactively and reactively.

Responsibilities
  • Conducts security monitoring and intrusion detection analysis using various technology and analytic tools, such as web and next generation firewalls, machine and human behavior learning tools, host-based security system, security event and incident monitoring systems, virtual, physical, and cloud platforms, user endpoint (laptop, desktop, mobile, and internet of things (IOT)) systems, etc.
  • Provide incident response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary.
  • Performs threat hunting searches across a variety of technologies that are on-prem, cloud-based, and hybrid.
  • Identifies the tactics, techniques, and procedures (TTPs) of potential threats through the MITRE ATT&CK or similar frameworks.
  • Provide incident response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary.
  • Provides more advanced analytical capability in several security domains.
  • Adds new components to a roadmap, documents them effectively, and directs the testing and implementation of changes.
  • When provided with an objective to improve security in their security domain(s) and related technology, develops and implements action plans needed to effect the change.
  • Research new technologies/products and their impact on the infrastructure, prepares a preliminary evaluation of technologies/products and associated costs, and develops and presents recommendations to support anticipated future business needs.
  • Receives security and performance data and analyzes the baselines and efficacy of installed technologies. Proposes and implements any required changes, including identifying and planning for any resulting impacts on other technologies to optimize system availability and continuity.
  • Provides ongoing support and troubleshooting for incidents, correlations and reporting to more junior analysts to resolve immediate security threats and/or customer needs.
  • Provides technical leadership to project teams in their area of expertise and/or leads teams to complete projects specific to their area(s) of expertise to maximize and share learning.
  • Provides guidance and technical coaching to less experienced staff to support effective workflow and develop technical talent.
  • Correlates events and activities across systems to identify trends of unauthorized use.
  • Reviews alerts and data from sensors and documents formal, technical incident reports
  • Responds to computer security incidents according to the computer security incident response policy and procedures.
  • Provides technical guidance to first responders for handling information security incidents.
  • Provides timely and relevant updates to appropriate stakeholders and decision makers.
  • Validates and maintains incident response plans and processes to address potential threats.
  • Compiles and analyzes data for management reporting and metrics.
  • Works with data sets to identify patterns.
  • Understands security orchestration, automation and analysis techniques.
  • Monitors threat intelligence feeds to identify a range of threats, including indicators of compromise and advanced persistent threats (APTs)
  • Perform Contract management and supply management functions appropriate to reduce security risks.
  • May mentor less experienced staff.
  • Performs other duties and tasks as assigned.
  • Responsible for financial/budgeting/vendor/contract planning and management.
  • May need to work outside of normal work hours supporting 24/7 operations (i.e., evenings and weekends).
  • Travel may be required to other MTA locations or other external sites.
  • Observing the work performed by the contractor.
  • Reviewing invoices and approving them if the work has contractual standards.
  • Addressing performance issues with the contractor when possible.
  • Escalating issues to other parties as needed.

Qualifications:

Education and experience:
  • Education: bachelor's degree
  • Experience: At least 5 years of relevant experience. An equivalent combination of education and experience may be considered in lieu of a degree.
  • Must possess at least one of the following professional certifications in subject domain including but not limited to: Certified Information Security Professional (CISSP), or Global Information Assurance Certification (GIAC), or Certified Information Security Manager (CISM), or Certified in Risk and Information Systems Control (CRISC), or Certified Information Systems Auditor (CISA), or other related certification(s).

Technical Skills:
  • Must possess an expert/highly proficient in deep understanding of technology and cybersecurity domain principles within the context of Operational Technologies, Signaling Systems and Rolling Stock.
  • Expert/Highly Proficient, with the intelligence lifecycle including Direction, Collection, Processing, Analysis, Dissemination, and Feedback
  • Expert/Highly Proficient, developing countermeasures for a variety of systems including SIEM, Endpoint Security, Network Defenses, WAF, etc.
  • Expert/Highly Proficient, system integrations and automation pertaining to intelligence requirements
  • Expert/Highly Proficient proven ability to manage projects and initiatives
  • Expert/Highly Proficient ability to fit in with the constant shifting needs and demands of the business Departments.

Behavior Skills:
  • Must possess active listening, attention to detail, customer service, prioritization, and problem-solving skills.
  • Ability to work independently and strategically.
  • Demonstrated expertise in identifying and analyzing risks and developing effective mitigation strategies.
  • Strong technical knowledge and diverse skillset to understand various technologies, systems, and potential risks.
  • Excellent critical thinking, problem-solving, and decision-making skills.
  • Strong interpersonal and verbal and written communication skills, with the ability to effectively collaborate with both technical and non-technical peers.
  • Proven ability to manage multiple projects simultaneously and prioritize tasks based on urgency and impact.
  • Extensive hands-on experience with related tools.
  • Solid working knowledge of IT domains.
  • Ability to work under pressure and meet deadlines individually and collaboratively. Think logically, assess problems, and be results-oriented.
  • Ability to identify complex business and technology risks and associated vulnerabilities. Prioritize multiple tasks and switch between tasks quickly.
  • Ability to communicate effectively, both orally and in writing, to interact with team members, customers, management, and support personnel (technical and non-technical).
  • Ability to establish and maintain effective working relationships with employees at all levels within the organization, and with both internal and external customers.

Competencies:
  • Collaborates: Building partnerships and working collaboratively with others to meet shared objectives
  • Cultivates Innovation: Creating new and better ways for the organization to be successful.
  • Customer Focus: Building strong customer relationships and delivering customer-centric solutions.
  • Communicates Effectively: Developing and delivering multi-mode communications that convey a clear understanding of the unique needs of different audiences.

GENERAL:
  • May need to work outside of normal work hours (i.e., evenings and weekends)
  • Travel may be required to other MTA locations or other external sites

Pursuant to the New York State Public Officers Law & the MTA Code of Ethics, all employees who hold a policymaking position must file an Annual Statement of Financial Disclosure (FDS) with the NYS Commission on Ethics and Lobbying in Government (the "Commission").
MTA and its subsidiary and affiliated agencies are Equal Opportunity Employers, including with respect to veteran status and individuals with disabilities.

The MTA encourages qualified applicants from diverse backgrounds, experiences, and abilities, including military service members, to apply.

About Metropolitan Transportation Authority