Recent Searches

You haven't searched anything yet.

14 Security Operations Center (SOC) Analyst Jobs in New York, NY

SET JOB ALERT
Details...
Sibitalent Corp
New York, NY | Full Time
$123k-147k (estimate)
2 Months Ago
INTER-CON SECURITY SYSTEMS INC
New York, NY | Full Time
$51k-70k (estimate)
2 Weeks Ago
ClickJobs.io
New York, NY | Full Time
$86k-108k (estimate)
2 Months Ago
RGE Services Recruitment
New York, NY | Full Time
$92k-122k (estimate)
1 Day Ago
New York eHealth Collaborative
New York, NY | Other
$102k-128k (estimate)
1 Week Ago
ClickJobs.io
New York, NY | Full Time
$205k-253k (estimate)
1 Day Ago
TikTok
New York, NY | Full Time
$82k-105k (estimate)
2 Months Ago
JPMorgan Chase
New York, NY | Full Time
$74k-96k (estimate)
3 Months Ago
JPMorgan Chase
New York, NY | Full Time
$74k-96k (estimate)
3 Months Ago
JPMorgan Chase
New York, NY | Full Time
$74k-96k (estimate)
3 Months Ago
Allied Universal
New York, NY | Full Time
$49k-64k (estimate)
5 Months Ago
EY
EY
New York, NY | Full Time
$111k-151k (estimate)
1 Day Ago
Security Operations Center (SOC) Analyst
Sibitalent Corp New York, NY
$123k-147k (estimate)
Full Time 2 Months Ago
Save

sadSorry! This job is no longer available. Please explore similar jobs listed on the left.

Sibitalent Corp is Hiring a Security Operations Center (SOC) Analyst Near New York, NY

Job Details

Security operations center (SOC) Analyst

Onsite Role

Client :- NYPD

Need Local only (NYC)

Work Schedule: Sat - Mon

19:00 08:00 (7pm 8am)

Schedule: Sat Mon, 7pm 8am (3x13hrs, 4 days off), or as needed for escalations; includes weekends & holidays

The schedule is 3 days x 13-hour shifts, but similarly scheduled resources will usually tack on an extra hour to one of the shifts to make 40 hours.

Role Responsibilities:

  • Perform security monitoring and analysis leveraging SIEM and security tools
  • Conduct technical analysis and correlation of operating system, database, application, cloud and network logs to triage potential security events and incident investigations
  • Analyze tactics, techniques, and procedures (TTPs) for various intrusion sets
  • Develop custom SIEM content and tune security tools to prevent, detect and respond to malicious activity
  • Utilize EDR and network security tools to conduct host and network-based detection analysis
  • Conduct vulnerability scans and participate in tabletop exercises
  • Improve the incident response process through tabletop exercises, playbook development, and standard operating procedures
  • Day to day, primarily first responder to incidents

Requirements and Experience:

  • Must be willing to come onsite to NYC on a regular basis
  • Must have experience using various Threat Intelligence tools
  • Experience managing ticket escalations, and incident response coordination across engineering, security, and management teams
  • Experience in IDS/IPS, SIEM, EDR, DLP, Firewalls, DNS security, cloud security, Windows and Linux systems, etc.
  • Familiarity with the Cybersecurity Framework (CSF) and a threat intelligence framework such as MITRE ATT&CK
  • Deep knowledge of threat and vulnerability analysis
  • Extremely detail-oriented and ability to quickly investigate ongoing and emerging threats
  • Experience in developing, acquiring, maintaining and implementing threat intelligence
  • Strong computer knowledge (hardware & operating systems)
    • Strong network knowledge
    • Excellent communication skills (Phone/Email)
      • Ability to interact and assist users over the phone
      • Ability to communicate with confidence and ensure the highest level of professionalism.
      • Ability to write clear emails to non-technical staff and send incident updates to upper management when required.
      • Assist with weekly presentation slides and project updates
      • Strong forensics background (soft requirement)
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

Job Summary

JOB TYPE

Full Time

SALARY

$123k-147k (estimate)

POST DATE

07/31/2024

EXPIRATION DATE

08/28/2024

WEBSITE

sibitalent.com

HEADQUARTERS

Plano, TX

SIZE

50 - 100

Show more

Sibitalent Corp
Contractor
$81k-103k (estimate)
1 Day Ago

The job skills required for Security Operations Center (SOC) Analyst include Analysis, Communication Skills, Presentation, Operating System, Coordination, etc. Having related job skills and expertise will give you an advantage when applying to be a Security Operations Center (SOC) Analyst. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Security Operations Center (SOC) Analyst. Select any job title you are interested in and start to search job requirements.

For the skill of  Analysis
Energy Jobline IN
Full Time
$96k-117k (estimate)
1 Day Ago
For the skill of  Communication Skills
Penguin Recruit
Full Time
$48k-62k (estimate)
1 Day Ago
For the skill of  Presentation
J Crew Factory
Part Time
$34k-42k (estimate)
1 Day Ago
Show more

The following is the career advancement route for Security Operations Center (SOC) Analyst positions, which can be used as a reference in future career path planning. As a Security Operations Center (SOC) Analyst, it can be promoted into senior positions as an Information Security Analyst IV that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Security Operations Center (SOC) Analyst. You can explore the career advancement for a Security Operations Center (SOC) Analyst below and select your interested title to get hiring information.