Job Details

ID #44592231
State New York
City New york city
Job type Permanent
Salary USD TBD TBD
Source MTA New York City Transit
Showed 2022-08-04
Date 2022-08-03
Deadline 2022-10-02
Category Et cetera
Create resume

Security Specialist Levels 2-5

New York, New york city, 10004 New york city USA

Vacancy expired!

Job Information

JOB TITLE: Security Specialist Levels 2-5

SALARY RANGE: Level 2: Min.: $69,256 Mid: $92,341 Max: $115,426

Level 3: Min.: $74,597 Mid: $99,463 Max: $124,329

Level 4: Min.: $79,023 Mid: $105,364 Max: $131,705

Level 5: Min.: $86,653 Mid: $115,537.50 Max: $144,422

POINTS: Level 2 - 323

Level 3 - 393

Level 4 - 451

Level 5 - 551

DEPT/DIV: MTA Information Technology/ Office of IT Cyber Security Services

SUPERVISOR: Lead Cyber Security Monitoring

LOCATION: 2 Broadway, New York, NY 10004

HOURS OF WORK: 12:00am - 8:30am (7.5hrs)

8:00am - 4:30pm (7.5hrs)

3:30pm - 12:00am (7.5hrs)

In order to protect our employees and continue to provide safe and reliable service to our communities, as of November 14, 2021 we are requiring all new MTA hires to be fully vaccinated against COVID-19 prior to their start date. MTA will consider exceptions for religious and medical reasons, where appropriate. "Fully vaccinated" means you must have both doses of a 2-dose vaccine and two weeks have elapsed since the second dose, or have received 1 dose of a 1-dose vaccine and two weeks have elapsed since the dose. Proof of your vaccination status in the form of a CDC vaccine card must be submitted prior to your start date.

Summary

It is extremely critical for the MTA to detect any cyber security breaches and incidents in a short amount of time to secure the MTA's personal, financial and transportation assets. This job is accountable for providing Tier 1 & 2 support for Security Event Detection, Response and incident investigation support activities related to the Cyber Security Operation Center (CSOC).

This position at the MTA is a highly skilled technical position which requires an individual with up-to-date expert security knowledge of Enterprise Network, Applications, Endpoint and Security Infrastructure. The individual should possess advance knowledge of network communications, Cloud security systems, SIEM, Firewalls, Intrusion Protection Systems, Remote Access VPN, Internet Proxy, Wireless Security, NAC, Enterprise Identity and Access Management systems, Database, computer systems, Operating systems, Programming, Active Directory, security event analysis and forensic investigation etc. Candidate should be current on industry standard security information, trends, and ever evolving technology utilized in enterprise security.

Utilizing this required expertise, this position will assist the CSOC Management in effectively maintaining an efficient Security Operation Center at the MTA. More specifically, this position is part of the team charged with responding to real time monitoring, analytics and alerting on events occurring across the MTA Enterprise Network & Security Infrastructure utilizing various Security Information and Event Management tools. This position will operate as part of a Cyber Security Monitoring team within MTAIT Security Operations unit and provide cyber security threat & vulnerability awareness to CSOC management with respect to current infrastructure security events, reporting, and investigation monitoring and day to day security operation.

Responsibilities

Level 2
  • Provide real time monitoring, analytics and alerting on events occurring across the MTA Enterprise Network & Security Infrastructure utilizing Splunk Enterprise Security.
  • Review, analyze and investigate Analyst Tier 1 escalated incidents and report on security incidents and trends occurring on the perimeter/internal infrastructure utilizing security event analysis tools such as Splunk.
  • Provide security support to all MTA users.
  • Work with partners, vendors, other business units, and law enforcement agencies to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets.
  • Collaborate with other IT business units and customers to remediate and mitigate security concerns.
  • Work with other IT business to ensure awareness of security controls and incident response procedures.
  • Maintain and coordinate compliance with PCI-DSS/PPSI Controls and risk assessment.
  • Assist and serve as backup to other staff members in supporting Cyber Security Operation Center 24x7x365.
Level 3

Same responsibilities

as

Level

2

with

the

following

additional

responsibilities:
  • Conduct follow-up activities on escalated cyber security incidents which includes deep-dive event analysis to access scope and impact to the organization and establish/recommend remediation, countermeasure, and detection criteria.
  • Mentor and Assist Analyst Tier 1 and 2 in proper investigation techniques of security incidents occurring in the perimeter/internal infrastructure utilizing security event analysis tools such as Splunk.
  • Assist, document, train and serve as backup to other staff members in supporting Cyber Security Operation Center 24x7x365.
Level 4

Same

responsibilities

as

Level

3

with

the

following

additional

responsibilities:
  • Research and develop techniques for incident analysis, evidence collection and protection utilizing both Open Source and MTA owned and security tools.
  • Assist the forensic investigation team with on-going cyber security investigations.
  • This position will perform decisions based on MTA and New York State standard and policies requirement. Any exception to the policy will be done under guidance and approval from MTA IT Leadership. This position will require in making quick decisions as it relates to Cyber security operation center security incident findings.
Level 5

Same

responsibilities

as

Level

4

with

the

following

additional

responsibilities:
  • Examine malicious software (bots, worms, and Trojans) to understand the nature of the threats. Document the attack capabilities, understand the characteristics, and define signatures to detect malware, and perform reverse engineering to examine how the program interacts with the environment.
  • Perform administration of all associated Security Monitoring devices & tools which includes but are not limited to Splunk Enterprise, Splunk Enterprise Security, FireEye Suite, Palo Alto, McAfee ePO, DLP, Office 365, UBA/UEBA, Zscaler Proxy, Active Directory, Remote Access / VPN, NAC, Wireless etc. for all MTA network 24x7x365 to ensure the security of all MTA critical and non-critical infrastructure and applications.
  • Assume ownership of the security monitoring elements of a project or the implementation of any large-scale system.
  • Develop and maintain the IT security incident response process, including all required supporting materials. Planning and coordination of security tasks and activities in support of IT related projects and initiatives.
  • Escalate complex issues to next level security support and report it to CSOC lead and ensure execution of the incident response process to the resolution of the incident.
  • Organize, participate in and, if required, chair post incident reviews for presentation to the senior management.
  • Responsible to provide 24x7x365 security operation support as it relates to all security technologies managed by Cyber Security Operation Center at MTA and assist, train, mentor and serve as backup to other staff members including union staff in supporting Cyber Security Operation Center 24x7x365.
Qualifications

Level 2
  • Proven knowledge and familiarity with various components of information security systems, maintaining and troubleshooting security resources including, but not limited to Firewall software, Encryption software, remote access solutions, SIEM, Authentication and commercial off the shelf security software with the ability to support this software on servers, desktops, laptops, and mobile devices and various operating systems.
  • Demonstrated knowledge of analyzing, monitoring and investigating various internet security technologies and computer networking.
  • Strong critical thinking skills.
  • Ability to troubleshoot and support technical issues both remotely and on-site using standard MTA tools and techniques.
  • Ability to read and understand schematic diagrams, technical manuals and documentation such that supported equipment and software can be maintained with minimal training.
  • Strong oral and written communications skills.
  • Strong analytical skills.
  • Strong people skills.
  • Must be able to move and lift up to 25 lbs. of equipment such as monitors, keyboards, CUPs, laptops, firewalls, etc.
  • Ability to analyze, co-relate and investigate computer logs and incidents, requiring strong analytical thinking and understanding of various security technologies.
  • Ability to utilize all associated Security Monitoring devices & tools which include but are not limited to Splunk Enterprise Security, FireEye Suite, Palo Alto, McAfee ePO, DLP, Office 365, UBA/UEBA, Zscaler Proxy, Active Directory, Remote Access / VPN, NAC, Wireless etc. for security incident investigations.
  • The position requires continuous learning and up-to-date knowledge of all newly discovered threat and issues in cyber security world and to find ways to combat and detect security incident and breaches.
  • The position will be required to stay up-to-date with technical knowledge on all security products as well as any product that is used within organization that support critical and internet facing infrastructure.
  • This position will require 24x7 on call availability.
Level 3

Same as Level 2 with the following additional qualifications:
  • Strong knowledge of and familiarity with various components of an information security program, including firewalls, authentication protocols, encryption software, remote access systems, and commercial-off-the-shelf security products.
  • Strong knowledge of troubleshooting methodologies appropriate to the implementation platform, e.g., servers, desktops, laptops, or mobile devices.
  • Strong knowledge of and familiarity with internet technologies and computer networking. Strong ability to investigate, troubleshoot and support technical issues both remotely and on-site using standard MTA tools and techniques.
  • Ability to perform project management responsibilities when required for the implementation or update to security systems, policies and processes.
  • Ability to provide technical direction to staff members, and to guide new lower level staff members that enter the security team.
  • Ability to perform electronic data recovery and computer forensics efficiently utilizing industry standard tools.
  • Ability to recommend and draft effective security policies and procedures.
  • Ability to perform research and recommend solutions for security problems to management.
Level 4

Same

as

Level

3

with

the following additional qualifications:
  • Possess strong knowledge of programing languages such as: SQL, JAVA, HTML, JavaScript, C, C#, XML, Perl, and Python
  • Advanced knowledge of and familiarity with various components of an information security system, including firewalls, authentication protocols, encryption software, remote access systems, and commercial-off-the-shelf security products.
  • Advanced knowledge of and familiarity with internet technologies and computer networking.
  • In depth knowledge of Enterprise Network/Security Infrastructure, Mentor and Assist Analyst 1 and 2 in proper investigation techniques of security incidents occurring in the perimeter/internal infrastructure utilizing security event analysis tools such as Splunk.
  • Ability to provide technical direction to less senior staff members, and to train new lower level staff members that enter the security team.
  • Ability to plan, design and engineer solutions and projects for the security team.
  • Ability to perform project management tasks related to solutions and projects for the security team.
Level 5

Same

as

Level

4

with

the following additional qualifications:
  • Expert knowledge of and familiarity with various components of an information security system, including firewalls, authentication protocols, encryption software, remote access systems, and commercial-off-the-shelf security products. Knowledge of troubleshooting methodologies appropriate to the implementation platform, e.g., servers, desktops, laptops, or mobile devices.
  • Expert knowledge of and familiarity with internet technologies and computer networking. Demonstrated ability to investigate, troubleshoot, lead and support technical issues both remotely and on-site using standard MTA tools and techniques.
  • Demonstrated ability to read, understand and develop schematic diagrams, technical manuals and documentation such that supported equipment and software can be maintained with minimal training.
  • Experience with examining malicious software (bots, worms and Trojans) is plus. An advanced degree and/or professional certification is desirable.
  • Collaborate with a team of experienced malware analysts and researchers.
  • Develop novel solutions to challenges facing incident responders and malware analysts Ability to reverse engineer binaries of various types
  • Strong understanding of Microsoft Windows Internals Ability to analyze shell code
  • Understanding of software exploits
  • Ability to analyze packed and obfuscated code Capable of Python scripting to automate analysis tasks
  • Experience developing scripts to decode obfuscated data and network communications Experience developing applications in C, C, and .NET
  • Capable of identifying host- and network-based indicators Experience mitigating anti-reverse engineering techniques
  • Ability to consume and synthesize intelligence about actors, techniques or situations to identify emerging risk scenarios
  • Demonstrated leadership and people skills.
  • Demonstrated ability to provide technical direction to less senior staff members, and to train new lower level staff members that enter the security team.
  • Demonstrated ability to recommend and draft security policies and procedures. Demonstrated ability to perform research and recommend solutions for security problems to management.
  • Demonstrated ability to plan, design and engineer solutions and projects for the security team. Demonstrated ability to perform project management tasks related to solutions and projects for the security team.
  • Demonstrated ability to be able to lead the planning and coordination of security tasks and activities within the security team.
  • Demonstrated ability to perform all technical and non-technical tasks, such as procurement, while ensuring that security tasks are completed on time and within budget.
  • Must demonstrate highly developed knowledge of current industry standard information security and market trends.
  • Demonstrated ability to plan, present and apply complex technology solutions to solve critical business requirements effectively and efficiently.
  • Proven experience working with senior level staff contributing to both short- and long-term technology related planning strategies.
  • This position will require 24x7 on call availability and working various shifts.
Education and Experience

Level 2
  • Bachelor's degree in Computer Science, Information Services or IT Security related field -Or- A satisfactory equivalent with at least 2 years of Information Technology experience.
  • 1 - 2 years of experience Tier 1 & 2 support for cyber security operation center. Experienced with performing network security administration such as firewalls, IPS, Proxy, VPN, Wireless Security, NAC, security event correlation tools etc.
  • 1 - 2 years of experience with application security, data encryption, identity management, policy & procedure. Experience with Perform log correlation between security, network and application logs including troubleshooting and performing root cause analysis of complex IT solutions.
  • Must possess a minimum of 1 - 2 years' experience with security analysis and forensic investigation.
Level 3
  • Bachelor's degree in Computer Science, Information Services or IT Security related field -Or- A satisfactory equivalent with at least 3 years of Information Technology experience.
  • 3 - 4 years of experience Tier 1 & 2 support for cyber security operation center. Experienced with performing network security administration such as firewalls, IPS, Proxy, VPN, Wireless Security, NAC, SIEM, Email, Endpoint Security etc.
  • A minimum of 2 years of experience with application security, data encryption, identity management, policy & procedure. Experience with Performing log correlation between security, network and application logs including troubleshooting and performing root cause analysis of complex IT solutions.
  • Must possess a minimum of 2 years' experience with security analysis and forensic investigation.
Level 4
  • Bachelor's degree in Computer Science, Information Services or IT Security related field or a satisfactory equivalent with at least 3 years of Information Technology experience.
  • 3 - 5 years of experience Tier 1 & 2 support for cyber security operation center. Experienced with performing network security administration such as firewalls, IPS, Proxy, VPN, Wireless Security, NAC, security event correlation tools etc.
  • A minimum of 3 years of experience with application security, data encryption, identity management, policy & procedure. Experience with Perform log correlation between security, network and application logs including troubleshooting and performing root cause analysis of complex IT solutions
  • Two or more years of demonstrated experience managing a high-performing, cohesive security response team preferred.
  • Must possess a minimum of 4 years' experience with security analysis and forensic investigation.
Level 5
  • Bachelor's degree in Computer Science, Information Technology or related discipline OR a satisfactory equivalent with 5-6 years of Information Technology experience.
  • A minimum of 5 years of experience with application security, data encryption, identity management, policy & procedure. Experience with Perform log correlation between security, network and application logs including troubleshooting and performing root cause analysis of complex IT solutions.
  • Must possess a minimum of 4 years' experience with security analysis and forensic investigation.
Other Information

As an employee of MTA Headquarters, you may be required to complete an annual financial disclosure statement with the State of New York, if your position earns more than $101,379 (this figure is subject to change) per year or if the position is designated as a policy maker.

How To Apply

Qualified applicants can submit an online application by clicking on the 'APPLY NOW' button from either the CAREERS page or from the JOB DESCRIPTION page.

If you have previously applied on line for other positions, enter your User Name and Password. If it is your first registration, click on the CLICK HERE TO REGISTER hyperlink and enter a User Name and Password; then click on the REGISTER button.

Equal Employment Opportunity

MTA and its subsidiary and affiliated agencies are Equal Opportunity Employers, including with respect to veteran status and individuals with disabilities.

The MTA encourages qualified applicants from diverse backgrounds, experiences, and abilities, including military service members, to apply.

Vacancy expired!

Subscribe Report job