Overview
Skills
Job Details
Title: Senior SOC Analyst Location: New York, NY Night Shift
Duration: 12 Months contract
SCOPE OF SERVICES TASKS:
Monitor, detect, and analyze security events across enterprise networks, endpoints, and cloud environments using government-approved SIEM and monitoring platforms.
Conduct in-depth investigations of suspected security incidents and prepare incident reports.
Provide threat intelligence analysis and correlate findings with organizational risks.
Develop, review, and update security policies, procedures, and standards.
Collaborate with IT, DevOps, and business units to implement secure configurations and architectures.
Recommend and implement security automation for log analysis, alerting, and response.
Prepare executive-level briefings and metrics on cybersecurity risks, incidents, and trends.
Perform cyber incident triage, investigation, containment, eradication, recovery, and reporting in accordance with NIST SP 800-61 and agency Incident Response Plans.
Conduct threat intelligence analysis and provide situational awareness reports to agency leadership.
Draft, update, and maintain cybersecurity policies, procedures, standard operating procedures (SOPs), and training documentation.
Participate in agency cyber exercises, penetration testing support, and red team/blue team activities.
MANDATORY SKILLS/EXPERIENCE Note: Candidates who do not have the mandatory skills will not be considered.
Minimum of eight (8) years of cybersecurity experience with at least three (3) years in a senior or lead analyst capacity.
Strong knowledge of security operations, incident response, and threat intelligence.
Demonstrated experience with enterprise SIEM tools (e.g., Splunk, Q-Radar, Microsoft Sentinel, Securonix) and endpoint detection and response EDR platforms (CrowdStrike, MS Sentinel).
Proficiency in network security, endpoint protection, and cloud security (AWS/Azure/Google Cloud Platform).
Strong understanding of frameworks such as NIST CSF, CIS Controls, MITRE ATT&CK.
Proficiency in cyber incident handling and forensic analysis.
Strong written and oral communication skills to brief executive leadership and technical staff.
Bachelor s degree in computer science, Information Security, or related field (or equivalent experience).
DESIRABLE SKILLS/EXPERIENCE:
Industry certifications: CISSP, CISM, GIAC (GCIH, GCIA, GCFA), CEH, or equivalent.
Experience working in highly regulated industries (government, healthcare, financial services, utilities).
Knowledge of secure software development lifecycle (SSDLC) and DevSecOps practices.
Familiarity with Zero Trust architectures and identity security.
Advanced scripting skills (Python, PowerShell, Bash) for automation and log analysis.
Experience with SOAR platforms for automated incident response