×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Analyst SOC Levels

Job in New York, New York County, New York, 10261, USA
Listing for: Metropolitan Transportation Authority
Part Time position
Listed on 2025-12-06
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 114537 - 153731 USD Yearly USD 114537.00 153731.00 YEAR
Job Description & How to Apply Below
Position: Cybersecurity Analyst SOC Levels 3-5
Location: New York

Job Title: Cybersecurity Analyst SOC Levels 3-5

Salary Range: Level 3: $95,929 - $127,050

Level 4: $102,760 - $139,755

Level 5: $114,537 - $153,731

Level 4 - 451

Level 5 – 551

DEPT/DIV: MTA Information Technology/ Office of ITCyber

Security Services

SUPERVISOR :

Cyber Security Officer, Monitoring

LOCATION: 2 Broadway, New York, NY 10004

HOURS: 12:00am – 8:30am (7.5hours/day)

8:00am – 4:30pm (7.5hours/day)

3:30pm – 12:00am (7.5hours/day)

This position is eligible for telework which is currently 2 days per week. New Hires are eligible to apply 30 days after their effective date of hire.

Summary

The purpose of this position is to provide critical technical expertise in the detection, analysis and response to cybersecurity events. Cybersecurity Analyst will be responsible for early and accurate detection, prevention response, containment, and guidance to remediation of threats directed against the MTA on a 24/7 basis. The analysis is conducted through technology risk assessments, data analytics tools, business processes reviews and collaborate with security engineers, architects, developers, vendors, business units to constantly improve the overall security of the MTA.

The cybersecurity analyst will focus on specific domains and specialties within cybersecurity with a great degree of specialty to detect, protect and advise the organization proactively and reactively.

The Cybersecurity Analyst will be a member of the Cyber Security Operation Center “CSOC”. This role will conduct real-time 24/7 security monitoring and intrusion detection analysis using a Security Incident & Event Management system “SIEM” along with various technology and analytic tools, such as web and next generation firewalls, machine and human behavior learning tools, host-based security system, security event and incident monitoring systems, virtual, physical, and cloud platforms, user endpoint (laptop, desktop, mobile, and internet of things/IOT) systems, etc.

The Analyst will research emerging threats and vulnerabilities to aid in the identification and analysis of network incidents, and supports the creation or improvement of security controls, policies, standards, and guidance to address them.

Desired Skills
  • Ability to perform analysis and remediation actions on threats from various attack vectors such as: malware, viruses, ransomware, phishing, SQL Injection, compromised credentials, DDOS etc.
  • Ability to provide incident response support
  • Ability to mitigate actions to contain activity
  • Ability to facility forensic analysis
Responsibilities
  • Researching emerging threats and vulnerabilities to aid in the identification of network incidents, and supports the creation of new architecture, policies, standards, and guidance to address them
  • Provide incident response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary
  • Conducts security monitoring and intrusion detection analysis using various technology and analytic tools, such as web and next generation firewalls, machine and human behavior learning tools, host-based security system, security event and incident monitoring systems, virtual, physical, and cloud platforms, user endpoint (laptop, desktop, mobile, and internet of things/IOT) systems, etc.
  • Correlates events and activities across systems to identify trends of unauthorized use
  • Reviews alerts and data from sensors and documents formal, technical incident reports
  • Tests new systems and manage cybersecurity risks and remediation through analysis
  • Responds to computer security incidents according to the computer security incident response policy and procedures
  • Provides technical guidance to first responders for handling information security incidents
  • Provides timely and relevant updates to appropriate stakeholders and decision makers
  • Communicates investigation findings to relevant business units to help improve the information security posture
  • Validates and maintains incident response plans and processes to address potential threats
  • Compiles and analyzes data for management reporting and metrics
  • Monitors relevant information sources to stay up to date on current attacks and trends
  • Analyzes potential impact…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary