More jobs:
SOC Senior Threat Analyst
Job in
New York, New York County, New York, 10261, USA
Listed on 2026-01-12
Listing for:
PRIORITY CARES HOME SERVICES
Full Time
position Listed on 2026-01-12
Job specializations:
-
IT/Tech
Cybersecurity, Security Manager
Job Description & How to Apply Below
Location
Onsite – 11 Metro Tech Center, 5th Floor (SOC), Brooklyn, NY 11201
Work Schedule- Shift: Night shifts between 6:00 PM – 6:00 AM
- Includes: Weekend and holiday shifts
- Hours: 35 hours per week (excluding mandatory unpaid meal break after 6 hours)
$50 to $55 per hour
Job JustificationThe Senior Threat Analyst role is a critical part of NYC Cyber Command’s effort to defend the city's infrastructure and sensitive data against escalating cybersecurity threats. This position ensures ongoing threat detection, analysis, and incident response to minimize risks, prevent breaches, and maintain public safety. Without this position, NYC is at increased risk of cyberattacks that could disrupt critical services.
Scope of Services &Key Responsibilities
- Monitor and analyze City networks for intrusions, anomalies, and potential threats.
- Provide 24x7x365 support as part of the Security Operations Center (SOC) team.
- Coordinate incident response and threat mitigation with internal teams and external partners.
- Generate and maintain SOC situation reports (SITREPs), metrics, and routine documentation.
- Perform weekly quality control and security assessments.
- Collaborate on the development and refinement of SOC playbooks and runbooks.
- Act as a senior team member providing guidance and leadership to junior analysts.
- 8+ years of experience in Threat Management, SOC, or Incident Response.
- Proven leadership skills—able to guide junior analysts and manage SOC operations.
- Hands-on experience with SOC environments and tools including:
- SIEM (e.g., Splunk, IBM QRadar)
- IDS/IPS systems
- EDR tools (e.g., Crowd Strike, Carbon Black)
- Strong knowledge of cybersecurity frameworks and best practices.
- Deep understanding of network protocols and host-level security.
- Experience with:
- Threat hunting and proactive detection
- Malware analysis and mitigation
- Diagnostic tools like Net Flow, IDS logs, security event logs
- Ability to apply principles of confidentiality, integrity, and availability.
- Excellent verbal and written communication, especially for executive reporting.
- Experience in full incident response lifecycle: detection, containment, mitigation, and recovery.
- Must be available for night shifts, weekends, and emergency/critical coverage as needed.
- Position requires onsite presence at SOC headquarters.
$50.00 - $55.00 per hour
#J-18808-LjbffrPosition Requirements
10+ Years
work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×