Job Description
Job Description
Title: Senior Threat Analyst
Location: Brooklyn, NY
Duration: 2 Years
Job Summary
The Senior Threat Analyst is responsible for protecting critical digital infrastructure by monitoring, analyzing, and responding to cybersecurity threats in a Security Operations Center (SOC) environment. This role focuses on identifying emerging threats, analyzing suspicious activity, and implementing proactive security measures to reduce risk to organizational systems and data.
The analyst will collaborate with internal cybersecurity teams, stakeholders, and external partners to strengthen defensive capabilities, ensure rapid incident response, and support the continuous improvement of security monitoring and threat intelligence processes.
Key Responsibilities
-
Provide security monitoring and threat analysis support within a 24/7/365 Security Operations Center (SOC) environment.
-
Monitor networks, security systems, and alerts for intrusions, suspicious activity, and potential compromises.
-
Investigate and analyze security events to determine severity, scope, and appropriate response actions.
-
Correlate threat intelligence across multiple security logs and monitoring tools.
-
Apply mitigation techniques or escalate security incidents according to established procedures.
-
Produce operational metrics, security reports, and documentation related to SOC activities.
-
Maintain situation reports (SITREPs) for ongoing security events.
-
Perform regular quality assurance checks on SOC processes and monitoring activities.
-
Collaborate with cybersecurity leadership to develop and refine incident response playbooks and operational runbooks.
-
Coordinate with internal teams, external partners, and vendors to address cybersecurity incidents and vulnerabilities.
-
Support threat intelligence initiatives and contribute to proactive threat detection and prevention strategies.
Required Qualifications
-
Minimum 8 years of experience in Threat Management, Security Operations Center (SOC), or Incident Response environments.
-
Prior experience working in a SOC environment with knowledge of operational procedures and security monitoring workflows.
-
Strong experience with Security Information and Event Management (SIEM) tools.
-
Experience with Intrusion Detection and Prevention Systems (IDS/IPS).
-
Experience using Endpoint Detection and Response (EDR) technologies.
-
Demonstrated leadership abilities including mentoring junior analysts and coordinating SOC operations.
-
Strong analytical, troubleshooting, and problem-solving skills.
Preferred Qualifications
-
Strong knowledge of cybersecurity principles, practices, and frameworks.
-
Solid understanding of network and host-based technologies.
-
Experience detecting and analyzing network and host intrusions using IDS technologies.
-
Experience with SIEM tools, malware analysis, and threat mitigation techniques.
-
Understanding of cybersecurity and privacy principles including confidentiality, integrity, availability, authentication, and non-repudiation.
-
Experience analyzing data from diagnostic and monitoring tools such as NetFlow, IDS systems, and security event logs.
-
Experience with threat hunting techniques to proactively identify potential security risks.
-
Experience handling security incidents including containment, mitigation, and recovery activities.
-
Strong communication skills with the ability to present security findings and recommendations to both technical and non-technical stakeholders.