You will step into a real operational tension: stopping credential compromises and API abuse without disrupting the legacy dispatch terminals and onboard fare readers that keep buses moving. Our attack surface spans headquarters, automated fare collection, and field devices that cannot tolerate sudden network isolation or forced password resets. You will triage SIEM alerts, coordinate patch rollouts across IT and selected OT environments, and navigate TSA directives and federal reporting timelines while keeping the actual transit network running. This is defense built around operational reality, not a theoretical audit.
At this level, you will own investigations end-to-end. You will lead cross-functional incident response, map attacker behavior across identity and API vectors, and translate those findings into hardened detection logic. Instead of chasing new tools, you will tune the SIEM and EDR already in place, systematically cutting false positives and sharpening alert fidelity across both corporate and transit systems. Your work directly reduces the noise our team faces, speeds up containment, and builds runbooks that survive the next tabletop exercise.
You will join a lean SOC that measures success by uptime and rider safety, not compliance checkboxes. We work shoulder-to-shoulder with OT engineers, dispatch coordinators, and agency IT staff, treating security as a collaborative function rather than a gatekeeper. If you want to learn how transit networks actually operate, experiment with detection engineering, and leave a measurable mark on infrastructure that moves millions of people daily, you will fit right in. We share context openly, iterate on feedback, and expect everyone to teach as much as they learn.