Assessment Data Analyst

  • Posted 1 day ago | Updated 1 day ago

Overview

Remote
Depends on Experience
Accepts corp to corp applications
Contract - W2
Contract - Independent

Job Details

Job Description:
Our client is seeking a detail-oriented and experienced Assessment Data Analyst to join their team on a full-time basis. This role is pivotal in supporting the aggregation of individual assessments to measure the overall cybersecurity posture of business units. The successful candidate will be responsible for monitoring cybersecurity assessment data flows, recommending quality improvement initiatives, and developing mappings between existing controls and judiciary assessment metrics.

Responsibilities:
  • Monitor and analyze cybersecurity assessment data flows to ensure accuracy and integrity.
  • Recommend and implement quality improvement initiatives for cybersecurity assessment processes.
  • Develop and maintain mappings between existing controls and judiciary assessment metrics.
  • Conduct comprehensive federal cybersecurity assessments measuring compliance with NIST 800-53 rev 4 or newer control family.
  • Assess compliance with the Federal Information Security Modernization Act (FISMA) during federal assessments.
  • Document findings comprehensively and provide actionable recommendations for implementing appropriate controls.
  • Utilize Splunk as a Security Information and Event Management (SIEM) tool to analyze event logs and build detections.
  • Engage in proactive threat hunting using the MITRE ATT&CK Framework within the network environment.

Qualifications:
  • Minimum of 2 years’ experience conducting federal cybersecurity assessments.
  • Proven experience with compliance assessments related to NIST 800-53 rev 4 or newer and FISMA.
  • Strong customer-facing skills with an ability to document and recommend compliance solutions.
  • Proficiency in using Splunk as a SIEM for event log analysis and threat detection.
  • Knowledge of the MITRE ATT&CK Framework and its application in threat hunting and detection.
  • Experience in a SOC Analyst role with Splunk is highly desirable.
  • Ability to identify, map, and analyze data flow within enterprise networks.
  • Excellent problem-solving skills and attention to detail.
  • Strong communication and documentation skills.
  • Ability to work independently and manage multiple tasks effectively in a fully remote environment.

Pay Range: $45.00 - $50.00 Hourly

This is a fully remote role and can be performed from an approved location.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About GDH