Senior SOC Analyst Night Shift (Hybrid, Brooklyn NY) 24 Months Contract

Overview

Hybrid
Depends on Experience
Contract - Independent
Contract - W2
Contract - 24 Month(s)
Able to Provide Sponsorship

Skills

CISM
CISSP
Cloud Computing
NIST SP 800 Series
SIEM
Splunk
Regulatory Compliance
Incident Management
Python
Penetration Testing
Certified Ethical Hacker
DevSecOps

Job Details

We are seeking candidates for a Senior SOC Analyst Night Shift position to support a public sector organization s cybersecurity operations in New York City. Please review the details below.

Position: Senior SOC Analyst Night Shift
Location: Brooklyn, NY (Hybrid: 2 days in office Friday & Saturday, 1 day remote Thursday)
Schedule: Night shift, Thursday, Friday & Saturday, approximately 7:00 PM 7:30 AM 35 hours per week
Duration: 24 Months

Job Overview:
The Senior SOC Analyst will strengthen the organization s security posture by monitoring, analyzing, and responding to security events. This role provides expertise in risk assessment, incident handling, and compliance, ensuring regulatory alignment and the protection of critical infrastructure and data.

Key Responsibilities:

  • Monitor, detect, and analyze security events across networks, endpoints, and cloud environments using approved SIEM tools

  • Conduct investigations of suspected security incidents and prepare reports

  • Provide threat intelligence analysis and correlate findings with risks

  • Review and update security policies and procedures

  • Collaborate with IT, DevOps, and business units on secure configurations

  • Implement security automation for alerting, analysis, and response

  • Prepare executive briefings and metrics on cybersecurity trends

  • Perform incident response activities in alignment with NIST SP 800-61

  • Provide situational awareness and participate in cyber exercises and penetration testing support

Mandatory Requirements:

  • Minimum 8 years of cybersecurity experience, with at least 3 years in a senior or lead analyst role

  • Strong knowledge of security operations, incident response, and threat intelligence

  • Experience with SIEM tools (e.g., Splunk, Q-Radar, Microsoft Sentinel), and EDR platforms

  • Proficiency in network, endpoint, and cloud security

  • Familiarity with NIST CSF, CIS Controls, MITRE ATT&CK

  • Strong incident handling, forensic analysis, and communication skills

  • Bachelor s in Computer Science, Information Security, or related field (or equivalent experience)

Desirable Skills:

  • Industry certifications (CISSP, CISM, GIAC, CEH, etc.)

  • Experience in regulated industries (government, healthcare, finance, etc.)

  • Secure software development lifecycle knowledge and DevSecOps practices

  • Scripting skills (Python, PowerShell, Bash) and SOAR platform experience

  • Familiarity with Zero Trust and identity security architectures

Special Requirements:

  • May require on-call availability for incident response

  • Strict adherence to policies regarding confidentiality and compliance

  • Willingness to work night shifts and participate in on-call rotations

  • Background check may be required

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.