Create Email Alert

Email Alert for

ⓘ There was an unexpected error processing your request.

Please refresh the page and try again.

If the problem persists, please contact us with your issue.

Email address is already registered

You can always manage your preferences and update your interests to ensure you receive the most relevant opportunities.

Would you like to [visit your alert settings] now?

Success! You're now signed up for Job Alerts

Get ready to discover your next great opportunity.

Similar Jobs

  • P. Chappel Associates, Inc.

    SOC Analyst

    New York, NY, United States

    SOC ANALYST (Enterprise Transformation Consultant) – This is a full-time, permanent position with our client, a growing cyber security professional services organization. Must be able to work in New York City a couple of days per week. Required Skills / Experience Experience working in a Security Operations Center (SOC) or similar enterprise securi

    Job Source: P. Chappel Associates, Inc.
  • Wix

    SOC Analyst

    New York, NY, United States

    • Ending Soon

    Company Description Job Description As SOC Analyst you will be the first responder to incoming requests on cyber security incidents. As a Security Operations Center Analyst you will: Triage, investigate, and escalate alerts as they occur in Wix environments. All analysts review all alert types - we don't want to silo you! Monitor and analyze Secu

    Job Source: Wix
  • Bertelsmann, Inc.

    SOC Analyst (Remote)

    New York, NY, United States

    We're seeking a talented SOC Analyst (3-5 years of experience) to join our growing team of cyber defenders! You'll be on the front lines, safeguarding our critical assets from ever-evolving threats. What you'll do: Execute and enhance operational processes for continuous monitoring of our environments Monitor and analyze security events to identi

    Job Source: Bertelsmann, Inc.
  • Related Company

    Cybersecurity / SOC Analyst

    New York, NY, United States

    Responsibilities Related Companies is seeking a Cybersecurity/SOC Analyst that will be focused on Threat Monitoring and Detection, Response, Analysis, Cyber Threat Intelligence to protect and maintain the overall security of the enterprise. The Cybersecurity Analyst will be responsible for, but not limited to the following: Detect threats through

    Job Source: Related Company
  • 2019

    SOC Analyst (Remote)

    New York, NY, United States

    • Ending Soon

    We're seeking a talented SOC Analyst (3-5 years of experience) to join our growing team of cyber defenders! You'll be on the front lines, safeguarding our critical assets from ever-evolving threats. What you'll do: Execute and enhance operational processes for continuous monitoring of our environments Monitor and analyze security events to identi

    Job Source: 2019
  • Zortechsolutions

    SOC Analyst Level 3-US

    Iselin, NJ, United States

    Role: SOC Analyst Level 3 Location: Iselin NJ and Bridge water NJ (2-3 days from Office) Duration: Contract/Full Time Must have : IBM QRadar and Splunk , IBM Resilient , Play books Creation , Security use case management. Required Expertise The ideal candidate for a SOC L1 position should have a strong understanding of cybersecurity concepts a

    Job Source: Zortechsolutions
  • Zortechsolutions

    SOC Analyst Level 3

    Iselin, NJ, United States

    Role: SOC Analyst Level 3 Location: Iselin NJ and Bridge water NJ (2-3 days from Office) Duration: Contract/Full Time Must have : IBM QRadar and Splunk , IBM Resilient , Play books Creation , Security use case management. Required Expertise The ideal candidate for a SOC L1 position should have a strong understanding of cybersecurity concepts a

    Job Source: Zortechsolutions
  • Lynx Technology Partners Inc

    Tier 2 SOC Analyst

    New York, NY, United States

    • Ending Soon

    Job Description PLEASE NOTE THIS POSITION WILL ALLOW CONSULTANT TO WORK REMOTELY. HOWEVER, DUTIES WILL REQUIRE CONSULTANT TO WORK ONSITE 3 DAYS PER WEEK. THEREFORE, WILL BE CRITICAL FOR THE CONSULTANT TO BE LOCAL TO NYC AND ABLE TO TRAVEL TO OUR OFFICE WITHOUT ISSUE, AS NEEDED (AT THEIR OWN EXPENSE) Company Overview: At Lynx Technology Partners, o

    Job Source: Lynx Technology Partners Inc

Senior SOC Analyst

Jersey City, NJ, United States

Title: Senior SOC Analyst

Location: 2 Broadway, NY (Hybrid 3 days a week onsite)

Duration: 6 Months contract

One of 3 shifts a day in a 24/7 operation (*consultant needs to be flexible enough to fill any of the 3 shifts as needed):

Shift 1 = 12am - 8:30am

Shift 2 = 8am - 4:30pm

Shift 3 = 3:30pm - 12am

*PLEASE NOTE THIS POSITION WILL ALLOW CONSULTANT TO WORK REMOTELY. HOWEVER, DUTIES WILL REQUIRE CONSULTANT TO WORK ONSITE 3 DAYS PER WEEK. THEREFORE, WILL BE CRITICAL FOR THE CONSULTANT TO BE LOCAL TO NYC AND ABLE TO TRAVEL TO OUR OFFICE WITHOUT ISSUE, AS NEEDED (AT THEIR OWN EXPENSE).

SUMMARY OF THE FUNCTION/ROLE:

The IT Cyber Security Operations Monitoring Team is seeking consultants to perform Tier 2 SOC follow-up and remediation activity on escalated incidents. The Tier 2 level Analyst (Senior Analyst) should have the ability to respond to a wide range of escalated Incidents and follow through with incident lifecycle through completion. Some of the areas we are looking for candidates to have experience in include but are not limited to:

Critical Key requirements:

• Critical Thinker & Analytical Aptitude

• SIEM Experience (Splunk)

• Tier II SOC Incident Handling & Investigation

• 24/7 Security Operation Center Experience

• Threat Detection & Response Experience

• Threat Detection Technologies Experience

RESPONSIBILITIES:

a. SIEM: The ability to conduct correlated searches and analysis utilizing a Security Incident & Event Management system.

b. Network: The ability to Analyze and dissect packets and validate threat signatures

c. Endpoint: Ability to perform basic static forensic analysis of Systems and Files

d. Email: Demonstrated ability to analyze email attributes such as Headers, and the ability to apply appropriate countermeasures to enhance email defense

e. Cloud: The ability to analyze anomalous detected traffic based on defined attack policies, ability to validate the treat and then determine remediation steps and present findings)

f. User & Entity Behavior Analytics: demonstrated capability to recognize and respond to various anomalous patterns of User's and Entity's activity to detect malicious intent.

g. Web Application: familiarity with various types of code-based attacks and the ability to detect and respond to them

h. Data Loss Prevention: Demonstrated capability to analyze DLP events and the ability to detect Data exfiltration through covert channels.

i. Document As-Is and To-Be playbooks for existing and future processe.

j. Coordinate and facilitate meetings such as process reviews, requirements, and various status reports

QUALIFICATIONS EXPERIENCE & EDUCATION:

• Knowledge of Enterprise Networks & Security infrastructure, Communication and internet security systems, Firewalls, Intrusion Protection Systems, Remote Access VPN, Proxy, Wireless Security, NAC, Enterprise ID Management systems, Database, computer systems, security event analysis and forensic investigations.

• Organizational, decision making, and communications skills.

• Knowledge of network security operations with a solid understanding of the technology and attention to detail.

• Creative problem-solving abilities, coupled with a desire to take on responsibility.

• Strong team player with the ability to engage and promote a cohesive unit.

• Ability to handle multiple tasks in a fast-paced environment and prioritize highly varied work in order to maintain required productivity levels.

• Ability to communicate technical' info and ideas so others will understand.

• Ability to make appropriate decisions considering the relative costs and benefits of potential actions.

• Ability to apply collaborative skills and traits that create solutions and results to unexpected situations.

• Bachelor's degree in Computer Science, Cyber Security, Information Technology or related discipline OR a satisfactory equivalent with 4-6 years of Information Technology experience.

Additional Skills and Information:

Security Event Monitoring, Network Event monitoring, Email Header Analysis, Packet Capture inspection, Malware Triage & Analysis, SIEM (Splunk) & TIP Experience

Apply

Create Email Alert

Create Email Alert

Email Alert for Senior SOC Analyst jobs in Jersey City, NJ, United States

ⓘ There was an unexpected error processing your request.

Please refresh the page and try again.

If the problem persists, please contact us with your issue.

Email address is already registered

You can always manage your preferences and update your interests to ensure you receive the most relevant opportunities.

Would you like to [visit your alert settings] now?

Success! You're now signed up for Job Alerts

Get ready to discover your next great opportunity.