Full-Time

Cybersecurity Operations Center Analyst

Posted on 8/14/2025

New York ISO

New York ISO

Compensation Overview

$78.5k - $131.1k/yr

No H1B Sponsorship

Albany, NY, USA

Hybrid

Work onsite from Rensselaer, NY location several days per workweek, with the option to work remotely on the remaining days.

US Top Secret Clearance Required

Category
IT & Security (1)
Required Skills
TCP/IP
Requirements
  • Bachelor's Degree (BS) in Information Security, Computer Science, Computer Information Systems or similar fields required. In lieu of degree requirements, significant security and/or industry experience may be considered
  • 1-3 years of experience as a Cyber Security Analyst or a Bachelor of Science or other advanced degree or cyber security experience may be considered
  • Knowledge of various security methodologies and processes, and technical security solutions (firewall, intrusion detection systems, and Security Information and Event Management (SIEM) platforms)
  • Knowledge of TCP/IP Protocols, network analysis, and network/security applications
  • Knowledge of common Internet protocols and web applications
  • Ability to multi-task, prioritize, and manage time effectively
  • Strong attention to detail
  • Excellent interpersonal skills and professional demeanor
  • Excellent verbal and written communication skills
  • Excellent customer service skills
  • Proficient in Microsoft Office Applications.
Responsibilities
  • Provide around the clock monitoring, analysis, and response to cyber security events
  • Stay ahead of and remain knowledgeable about new threats
  • Analyze all sourced cyber-intelligence of attacker tactics, techniques, and procedures (TTPs) across a large heterogeneous network of security devices and end-user systems
  • Participate in threat modeling collaboration with other members of the IT security team
  • Use automation to orchestrate solutions (SOAR) that automate repetitive tasks, and mature monitoring and response capabilities
  • Assist with incident response activities, including triage, remediation and documentation
  • Provide aid in threat and vulnerability research by assessing event data collected by systems both inside and outside of the CSOC
  • Investigate and document events to aid incident responders, managers and other CSOC team members on security issues and the emergence of new threats
  • Work alongside other security team members to hunt for and identify possible indication of compromise to the organization computing environments
  • Recognize potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event information
  • Escalate intrusions and compromises to NYISO’s network infrastructure, applications, and operating systems to the CSIRT as needed
  • Execute defined standard operating procedures, event and job aides required for successful task completion
  • Analyze and mitigate or remediate software and hardware vulnerabilities
  • Integrate and share information with other analysts and other teams
  • Recommend changes to Standard Operating Procedures and other similar documentation
  • Generate end-of-shift reports for documentation and knowledge transfer to subsequent analysts on shift
  • Maintain records of security monitoring and incident response activities, utilizing case management and ticketing technologies
  • Other duties as assigned
  • Provide threat and vulnerability analysis reporting as well as security advisory services.
Desired Qualifications
  • Experience administrating various operating systems (e.g., Windows, OS X, Linux, etc.) commonly deployed in enterprise networks
  • A conceptual understanding of Windows Active Directory is also desired
  • Working knowledge of network communications and routing protocols (e.g., TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g., SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.)
  • Experience working with various event logging systems and be proficient with security event log analysis
  • Previous experience with Security Information and Event Monitoring (SIEM) platforms that perform log collection, analysis, correlation, and alerting is also desired
  • Experience in analyzing net flow data and packet capture (PCAP).

Company Size

N/A

Company Stage

N/A

Total Funding

N/A

Headquarters

N/A

Founded

N/A

INACTIVE