Cybersecurity Analyst

Overview

Hybrid
Depends on Experience
Accepts corp to corp applications
Contract - Independent
Contract - W2
Contract - 12 Month(s)

Skills

Cybersecurity Analyst
Information security
Information assurance
System administration
Linux
Windows
CISSP
CISA
Cloud-based solutions
NIST 800-53
CMS MARS-E/ARC-AMPE
network
operating system
database
application security

Job Details

*REQUIRED CERTIFICATIONS MUST BE UPLOADED*
The Office of Information Technology is the office within DHS that provides computing, applications management, IT procurement, network and telecommunications services to all DHS divisions and offices.
Responsibilities
Proven experience in cybersecurity operations with hands-on expertise in monitoring and managing multiple security tools, including vulnerability scanning platforms such as Tenable (Nessus, Tenable.sc, or Tenable.io).

Continuously monitor security tools and systems (e.g., SIEM, IDS/IPS, CrowdStrike EDR, DLP, Tenable vulnerability scanners) to detect, investigate, and respond to potential threats in real time.

Maintain and oversee the CrowdStrike platform, ensuring proper configuration, alert triage, threat hunting, and endpoint coverage across the organization.

Analyze data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.

Interact at multiple levels of the organization to establish and maintain a strong and adaptive security posture that aligns with organizational risk tolerance, information access requirements, business strategies, and compliance requirements.

Integrate overarching security frameworks across multiple, complex disciplines in support of the business needs of the Agency to provide customer-focused technology solutions in a secure, cost-effective, and efficient manner.

Strong knowledge of system administration, including configuration, hardening, patch management, and monitoring of Windows and Linux servers

Coordinate and oversee the production of evidence to support internal and external audits.

Conduct internal risk, vulnerability, and compliance assessments to:

Identify risks, vulnerabilities, and compliance shortcomings; and recommend/develop security measures, policies, and controls for risk/vulnerability mitigation and remediation of compliance findings.

Ensure periodic monitoring of audit logs occurs in accordance with requirements, and report findings and concerns for further analysis and/or action, including breach notification and initiation of incident response, in accordance with Agency protocols/procedures and CISO direction/guidance.

Work with developers to plan, implement, manage, and coordinate appropriate security measures for information systems/applications that control access to data, and prevent unauthorized modification, destruction, or disclosure of information in accordance with federal, state, local, and agency requirements, policies, and directives.

Prepare and/or update Plan of Actions & Milestones (POA&M) that identify security weaknesses and establish milestones and compensating controls for remediating these weaknesses and tracking the progress and effectiveness of the remediation.

Serve as a Subject Matter Expert (SME), advising on current best practice and strategies for the protection, auditing, and monitoring of data, data storage, and transmission paths.

Work with business owners, IT managers, staff, and vendors to provide timely and efficient coordination of information assurance/security services to meet Agency needs.

Prepare and communicate status of Agency information security programs and projects to senior executives through oral and written reports and presentations.

Assist with information security awareness training activities and preparation of awareness training materials.

Develop and communicate security metrics to assess effectiveness of, and compliance with, the Agency s InfoSec policies and controls.

Performs other professional responsibilities as assigned.
Qualifications:

Bachelor's degree in information technology, computer science, information assurance, or a related field from an accredited college or university AND Five years of information technology experience, One year of which in information security or information assurance. Note: An equivalent combination of education and job specific experience that provided the knowledge, experience and competencies required to successfully perform the job at the level listed may be substituted on a year-over-year basis.
Desired Skills/Qualifications:

Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Information Systems Auditor (CISA)
Demonstrated professional experience developing and communicating an information security strategy and aligning projects, initiatives, and resources to execute against the strategy.

<>Required/Desired Skills</>
SkillRequired /DesiredAmount of experience required in YearsTotal YearsLast Used
Bachelor's degree in information technology, computer science, information assurance, or a related field from an accredited college or universityRequired0
Demonstrate knowledge of network, operating system, database and application security
Required2
Experience implementing and complying with Federal and State Laws
Desired2
Knowledge of current and emerging (Next Gen) Information Security Technologies and Practices
Required2
Proven experience with NIST 800-53 and/or CMS MARS-E/ARC-AMPERequired2
Experience in Cloud-based solutions and environmentsRequired2
Certified Information Systems Security Professional (CISSP) or Certified Information Systems Auditor (CISA) (MUST UPLOAD CERTIFICATION)Desired0
System administration experience with Linux and WindowsRequired2
Information security or Information assurance experienceRequired3

--

Regards,

Lakshmi |Technical Recruiter

Direct: |

Solomons International

|

About Solomons International: Solomons International has been in the IT Consulting and Staffing market for the past 13 years serving various public and commercial entities having national and international presence. We maintain the highest retention and satisfaction of our clients and candidates through our quality service levels and highest business ethics.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.