PRIORITY CARES HOME SERVICES
Location
Onsite – 11 MetroTech Center, 5th Floor (SOC), Brooklyn, NY 11201
Work Schedule
Shift:
Night shifts between 6:00 PM – 6:00 AM
Includes:
Weekend and holiday shifts
Hours:
35 hours per week (excluding mandatory unpaid meal break after 6 hours)
Pay Rate $50 to $55 per hour
Job Justification The Senior Threat Analyst role is a critical part of NYC Cyber Command’s effort to defend the city's infrastructure and sensitive data against escalating cybersecurity threats. This position ensures ongoing threat detection, analysis, and incident response to minimize risks, prevent breaches, and maintain public safety. Without this position, NYC is at increased risk of cyberattacks that could disrupt critical services.
Scope of Services & Key Responsibilities
Monitor and analyze City networks for intrusions, anomalies, and potential threats.
Provide 24x7x365 support as part of the Security Operations Center (SOC) team.
Coordinate incident response and threat mitigation with internal teams and external partners.
Generate and maintain SOC situation reports (SITREPs), metrics, and routine documentation.
Perform weekly quality control and security assessments.
Collaborate on the development and refinement of SOC playbooks and runbooks.
Act as a senior team member providing guidance and leadership to junior analysts.
Mandatory Skills/Experience
8+ years of experience in Threat Management, SOC, or Incident Response.
Proven leadership skills—able to guide junior analysts and manage SOC operations.
Hands-on experience with SOC environments and tools including:
SIEM (e.g., Splunk, IBM QRadar)
IDS/IPS systems
EDR tools (e.g., CrowdStrike, Carbon Black)
Strong knowledge of cybersecurity frameworks and best practices.
Deep understanding of network protocols and host-level security.
Experience with:
Threat hunting and proactive detection
Malware analysis and mitigation
Diagnostic tools like NetFlow, IDS logs, security event logs
Ability to apply principles of confidentiality, integrity, and availability.
Excellent verbal and written communication, especially for executive reporting.
Experience in full incident response lifecycle: detection, containment, mitigation, and recovery.
Special Requirements
Must be available for night shifts, weekends, and emergency/critical coverage as needed.
Position requires onsite presence at SOC headquarters.
Compensation $50.00 - $55.00 per hour
#J-18808-Ljbffr
Work Schedule
Shift:
Night shifts between 6:00 PM – 6:00 AM
Includes:
Weekend and holiday shifts
Hours:
35 hours per week (excluding mandatory unpaid meal break after 6 hours)
Pay Rate $50 to $55 per hour
Job Justification The Senior Threat Analyst role is a critical part of NYC Cyber Command’s effort to defend the city's infrastructure and sensitive data against escalating cybersecurity threats. This position ensures ongoing threat detection, analysis, and incident response to minimize risks, prevent breaches, and maintain public safety. Without this position, NYC is at increased risk of cyberattacks that could disrupt critical services.
Scope of Services & Key Responsibilities
Monitor and analyze City networks for intrusions, anomalies, and potential threats.
Provide 24x7x365 support as part of the Security Operations Center (SOC) team.
Coordinate incident response and threat mitigation with internal teams and external partners.
Generate and maintain SOC situation reports (SITREPs), metrics, and routine documentation.
Perform weekly quality control and security assessments.
Collaborate on the development and refinement of SOC playbooks and runbooks.
Act as a senior team member providing guidance and leadership to junior analysts.
Mandatory Skills/Experience
8+ years of experience in Threat Management, SOC, or Incident Response.
Proven leadership skills—able to guide junior analysts and manage SOC operations.
Hands-on experience with SOC environments and tools including:
SIEM (e.g., Splunk, IBM QRadar)
IDS/IPS systems
EDR tools (e.g., CrowdStrike, Carbon Black)
Strong knowledge of cybersecurity frameworks and best practices.
Deep understanding of network protocols and host-level security.
Experience with:
Threat hunting and proactive detection
Malware analysis and mitigation
Diagnostic tools like NetFlow, IDS logs, security event logs
Ability to apply principles of confidentiality, integrity, and availability.
Excellent verbal and written communication, especially for executive reporting.
Experience in full incident response lifecycle: detection, containment, mitigation, and recovery.
Special Requirements
Must be available for night shifts, weekends, and emergency/critical coverage as needed.
Position requires onsite presence at SOC headquarters.
Compensation $50.00 - $55.00 per hour
#J-18808-Ljbffr