MTA Senior Cybersecurity Analyst Threat Hunting & MITRE in New York, New York
Senior Cybersecurity Analyst Threat Hunting & MITRE
Job ID: 5894
Business Unit: MTA Headquarters
Location: New York, NY, United States
Department: IT Cyber Security
Date Posted: Feb 12, 2024
JOB TITLE: Senior Cybersecurity Analyst Threat Hunting & MITRE
SALARY RANGE: $130,245 - $153,731
HAY POINTS: 551
DEPT/DIV: Information Technology / Cybersecurity
SUPERVISOR: Cybersecurity Officer- Manager
LOCATION: Various/ 2 Broadway New York, NY 10004
HOURS OF WORK: 9:00 am - 5:30 pm
This position is eligible for telework which is currently two day per week. New hires are eligible to apply 30 days after their effective date of hire.
The MTA transportation network has very large systems and infrastructure for financial, business, automated train, transportation, power, and physical security. The MTA IT Department is centrally responsible for providing a full range of Information and Operational Technology services to the MTA agencies and administrative units through its operating and support units. Services are provided on a 7/24/365 basis in support of the MTA organization and its ridership.
The MTA IT Cybersecurity organization, is responsible for identifying, developing, implementing, and integrating cybersecurity-related processes internal and third-party supplier organizations to reduce the operational risks, reputational risks and financial risks. The organization also has robust cybersecurity operations functions designed to protect the MTA in real-time on a 7/24/365 basis.
This role is responsible for the MTA’s cyber threat intelligence through all phases of the intelligence lifecycle including Direction, Collection, Processing, Analysis, Dissemination, and Feedback. The Threat Intelligence Analyst must be able to recommend and develop countermeasures in direct alignment with the current threat landscape for highly-complex networks including networks that are comprised of Industrial Control Systems, Supervisory Control and Data Acquisition Systems, and Internet of Things Systems. Serving as part of the MTA Tier 3 Cyber Security Operations Center (CSOC), the analyst will also provide regular support in identifying intelligence gaps by applying critical thinking with an emphasis on the MITRE ATT&CK framework. This position regularly interfaces with several groups including senior MTA leadership, business partners, and ISACs to provide reports and presentations with tailored findings and recommendations.
Administration of Threat Intelligence Platform (TIP)
Performs threat hunting searches across a variety of technologies that are on-prem, cloud-based, and hybrid.
Assesses existing MITRE ATT&CK detection capabilities.
Identifies the tactics, techniques, and procedures (TTPs) of potential threats through the MITRE ATT&CK or similar frameworks.
Researching emerging threats and vulnerabilities to aid in the identification of network incidents, and supports the creation of new architecture, policies, standards, and guidance to address them.
Provide incident response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary.
Conducts security monitoring and intrusion detection analysis using various technology and analytic tools, such as web and next generation firewalls, machine and human behavior learning tools, host-based security system, security event and incident monitoring systems, virtual, physical, and cloud platforms, user endpoint (laptop, desktop, mobile, and internet of things/IOT) systems, etc.
Correlates events and activities across systems to identify trends of unauthorized use.
Reviews alerts and data from sensors and documents formal, technical incident reports
Tests new systems and manage cybersecurity risks and remediation through analysis.
Responds to computer security incidents according to the computer security incident response policy and procedures.
Provides technical guidance to first responders for handling information security incidents.
Provides timely and relevant updates to appropriate stakeholders and decision makers.
Communicates investigation findings to relevant business units to help improve the information security posture.
Validates and maintains incident response plans and processes to address potential threats.
Compiles and analyzes data for management reporting and metrics.
Monitors relevant information sources to stay up to date on current attacks and trends.
Analyzes potential impact of new threats and communicates risks back to detection engineering functions.
Performs root-cause analysis to document findings and participate in root-cause elimination activities as required.
Works with data sets to identify patterns.
Understands data automation and analysis techniques.
Uses judgment to form conclusions that may challenge conventional wisdom.
Hypothesizes new threats and indicators of compromise.
Monitors threat intelligence feeds to identify a range of threats, including indicators of compromise and advanced persistent threats (APTs)
Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate.
Perform Contract management and supply management functions appropriate to reduce security risks.
May mentor less experienced staff.
Performs other duties and tasks as assigned.
Responsible for financial/budgeting/vendor/contract planning and management.
May need to work outside of normal work hours supporting 24/7 operations (i.e., evenings and weekends).
Travel may be required to other MTA locations or other external sites.
Observing the work performed by the contractor.
Reviewing invoices and approving them if the work has contractual standards.
Addressing performance issues with the contractor when possible.
Escalating issues to other parties as needed.
Education and Experience:
Education: bachelor’s degree
Experience: At least 5 years of relevant experience. An equivalent combination of education and experience may be considered in lieu of a degree.
Must possess at least one of the following professional certifications in subject domain including but not limited to: Certified Information Security Professional (CISSP), or Global Information Assurance Certification (GIAC), or Certified Information Security Manager (CISM), or Certified in Risk and Information Systems Control (CRISC), or Certified Information Systems Auditor (CISA), or other related certification(s)
Must possess an expert/highly proficient in deep understanding of technology and cybersecurity domain principles within the context of Operational Technologies, Signaling Systems and Rolling Stock.
Expert/Highly Proficient, with the intelligence lifecycle including Direction, Collection, Processing, Analysis, Dissemination, and Feedback
Expert/Highly Proficient, developing countermeasures for a variety of systems including SIEM, Endpoint Security, Network Defenses, WAF, etc.
Expert/Highly Proficient, system integrations and automation pertaining to intelligence requirements
Expert/Highly Proficient proven ability to manage projects and initiatives
Expert/Highly Proficient ability to fit in with the constant shifting needs and demands of the business Departments.
Must possess active listening, attention to detail, customer service, prioritization, and problem-solving skills.
Ability to work independently and strategically.
Demonstrated expertise in identifying and analyzing risks and developing effective mitigation strategies.
Strong technical knowledge and diverse skillset to understand various technologies, systems, and potential risks.
Excellent critical thinking, problem-solving, and decision-making skills.
Strong interpersonal and verbal and written communication skills, with the ability to effectively collaborate with both technical and non-technical peers.
Proven ability to manage multiple projects simultaneously and prioritize tasks based on urgency and impact.
Extensive hands-on experience with related tools.
Solid working knowledge of IT domains.
Ability to work under pressure and meet deadlines individually and collaboratively. Think logically, assess problems, and be results-oriented.
Ability to identify complex business and technology risks and associated vulnerabilities. Prioritize multiple tasks and switch between tasks quickly.
Ability to communicate effectively, both orally and in writing, to interact with team members, customers, management, and support personnel (technical and non-technical).
Ability to establish and maintain effective working relationships with employees at all levels within the organization, and with both internal and external customers.
Collaborates: Building partnerships and working collaboratively with others to meet shared objectives
Cultivates Innovation: Creating new and better ways for the organization to be successful.
Customer Focus: Building strong customer relationships and delivering customer-centric solutions.
Communicates Effectively: Developing and delivering multi-mode communications that convey a clear understanding of the unique needs of different audiences.
May need to work outside of normal work hours (i.e., evenings and weekends)
Travel may be required to other MTA locations or other external sites
Pursuant to the New York State Public Officers Law & the MTA Code of Ethics, all employees who hold a policymaking position must file an Annual Statement of Financial Disclosure (FDS) with the NYS Commission on Ethics and Lobbying in Government (the “Commission”).
MTA and its subsidiary and affiliated agencies are Equal Opportunity Employers, including with respect to veteran status and individuals with disabilities.
The MTA encourages qualified applicants from diverse backgrounds, experiences, and abilities, including military service members, to apply.