Cybersecurity Analyst Critical Assets & Incident Response CERT Levels 3-5
NYC Staffing, New York
Cybersecurity Analyst Critical Assets & Incident Response
The purpose of this position is to provide critical technical expertise in the detection, analysis, and response to cybersecurity events. The cybersecurity analyst will be responsible for early and accurate detection, prevention, response, containment, and guidance to remediation of threats directed against the MTA on a 24/7 basis. The analysis is conducted through technology risk assessments, data analytics tools, business processes reviews, and collaboration with security engineers, architects, developers, vendors, and business units to constantly improve the overall security of the MTA.
The cybersecurity analyst will focus on specific domains and specialties within cybersecurity with a great degree of specialization to detect, protect, and advise the organization proactively and reactively.
Desired Skills:
- Experience with configuring and troubleshooting PLC, RTU, or HMI in industrial environments.
- Understanding and experience with various types of OT networking protocols, Modbus, Profibus, OPC, etc.
- Develop/review specification for PTC systems.
- Implement secure configurations and monitor Supervisory Control and Data Acquisition (SCADA) systems used in rail control.
- Use purpose-built firewalls for protecting railway signaling and communication systems.
Responsibilities:
- Researching emerging threats and vulnerabilities to aid in the identification of network incidents, and supports the creation of new architecture, policies, standards, and guidance to address them.
- Provide incident response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary.
- Conducts security monitoring and intrusion detection analysis using various technology and analytic tools.
- Correlates events and activities across systems to identify trends of unauthorized use.
- Reviews alerts and data from sensors and documents formal, technical incident reports.
- Test new systems and manage cybersecurity risks and remediation through analysis.
- Responds to computer security incidents according to the computer security incident response policy and procedures.
- Provides technical guidance to first responders for handling information security incidents.
- Provides timely and relevant updates to appropriate stakeholders and decision makers.
- Communicates investigation findings to relevant business units to help improve the information security posture.
- Validates and maintains incident response plans and processes to address potential threats.
- Compiles and analyzes data for management reporting and metrics.
- Monitors relevant information sources to stay up to date on current attacks and trends.
- Analyzes the potential impact of new threats and communicates risks back to detection engineering functions.
- Performs root-cause analysis to document findings and participate in root-cause elimination activities as required.
- Works with data sets to identify patterns.
- Understands data automation and analysis techniques.
- Uses judgment to form conclusions that may challenge conventional wisdom.
- Hypothesizes new threats and indicators of compromise.
- Monitors threat intelligence feeds to identify a range of threats, including indicators of compromise and advanced persistent threats (APTs).
- Identifies the tactics, techniques, and procedures (TTPs) of potential threats through the MITRE ATT&CK or similar frameworks.
- Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager.
- Perform Contract management and supply management functions appropriate to reduce security risks.
Education & Experience
Level 3: Bachelor's Degree and minimum 1 year of relevant experience. An equivalent combination of education and experience may be considered in lieu of a degree. Bachelor's degree in Computer Science or related fields preferred. CISSP or other advanced security-related certification preferred but not required. Requires prior experience with installing, maintaining, and troubleshooting technology systems.
Level 4: Bachelor's Degree and minimum 3 years of relevant experience. An equivalent combination of education and experience may be considered in lieu of a degree. 3+ years of relevant experience in a specific cybersecurity subdomain (Cloud, Applications, Infrastructure, Security Technology, etc.). Prefer at least one certification in the current platform/domain/technical skills.
Level 5: Bachelor's degree required. An equivalent combination of education and experience may be considered in lieu of a degree. 5+ years of relevant experience in a specific cybersecurity subdomain (Cloud, Applications, Infrastructure, Security Technology, etc.). Must possess at least one of the following professional certifications in subject domain including but not limited to: Certified Information Security Professional (CISSP), or Global Information Assurance Certification (GIAC), or Certified Information Security Manager (CISM), or Certified in Risk and Information Systems Control (CRISC), or Certified Information Systems Auditor (CISA), or other related certification(s).
Competencies: Management Level? Proficiency Level Standard Competencies Level 3 Adept Values Diversity Collaborates Capable Cultivates Innovation Customer Focus Communicates Effectively Fundamental Awareness Tech Savvy Technical Skills Level 4 Adept Communicates Effectively Values Diversity Collaborates Capable Cultivates Innovation Customer Focus Tech Savvy Technical Skills Level 5 Advanced Communicates Effectively Values Diversity Collaborates Adept Tech Savvy Technical Skills Cultivates Innovation Customer Focus
General: May need to work outside of normal work hours (i.e., evenings and weekends) Travel may be required to other MTA locations or other external sites.
Other Information: Please be advised that pursuant to the MTA Code of Ethics and New York State Ethics Law, you have been designated as a policymaker. Therefore, you will be required to file an annual financial disclosure statement with the Commission on Ethics and Lobbying in Government. The Commission will notify you of this filing requirement via your work email. Upon receipt of notification from the Commission, you will have 30 days to complete your financial disclosure statement.
Equal Employment Opportunity MTA and its subsidiary and affiliated agencies are Equal Opportunity Employers, including with respect to veteran status and individuals with disabilities. The MTA encourages qualified applicants from diverse backgrounds, experiences, and abilities, including military service members, to apply.