Threat Analyst

City of New YorkBrooklyn, NY
2dOnsite

About The Position

The Office of Technology and Innovation (OTI) leverages technology to drive opportunity, improve public safety, and help government run better across New York City. From delivering affordable broadband to protecting against cybersecurity threats and building digital government services, OTI is at the forefront of how the City delivers for New Yorkers in the 21st century. Watch our welcome video to see our work in action, follow us on social media @NYCOfficeofTech, and visit oti.nyc.gov to learn more. At OTI, we offer great benefits, and the chance to work on projects that have a meaningful impact on millions of people. You'll have the opportunity to work with cutting-edge technology and collaborate with other passionate professionals who share your drive and commitment to making a difference through technology. About New York City Cyber Command OTI’s Office of Cyber Command is committed to protecting City systems that provide vital services to New Yorkers from cyber threats, and helping residents become safer in their digital lives. As the organization defending the largest municipality in the country, Cyber Command is charged with directing citywide incident response, setting citywide cybersecurity policies and standards and working with city agencies to strengthen their cyber defenses. Threat Analysts within Cyber Command perform many critical functions within the Threat Management discipline. Chief among these functions is providing 24x7x365 coverage within the Security Operations Center. For this reason, Threat Analysts must be able and willing to fill night and weekend shifts.

Requirements

  • A baccalaureate degree from an accredited college and four years of satisfactory full-time experience related to projects and policies required by the particular position; or,
  • Education and/or experience which is equivalent to "1" above.

Responsibilities

  • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
  • Coordinate with enterprise-wide cyber defense staff to validate network alerts.
  • Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.
  • Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
  • Perform cyber defense trend analysis and reporting.
  • Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
  • Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy.
  • Plan and recommend modifications or adjustments based on exercise results or system environment.
  • Provide daily summary reports of network events and activity relevant to cyber defense practices.
  • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
  • Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
  • Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity.
  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
  • Determine tactics, techniques, and procedures (TTPs) for intrusion sets.
  • Examine network topologies to understand data flows through the network.
  • Recommend computing environment vulnerability corrections.
  • Identify and analyze anomalies in network traffic using metadata.
  • Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).
  • Work with stakeholders to resolve computer security incidents and vulnerability compliance.
  • Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans.
  • Handle special projects and initiatives as assigned.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service