Cyber Security Analyst - Level IV - Remote

Overview

Remote
Contract - W2
Contract - 12 Month(s)

Skills

ServiceNow
CrowdStrike EDR

Job Details

DivIHN (pronounced divine ) is a CMMI ML3-certified Technology and Talent solutions firm. Driven by a unique Purpose, Culture, and Value Delivery Model, we enable meaningful connections between talented professionals and forward-thinking organizations. Since our formation in 2002, organizations across commercial and public sectors have been trusting us to help build their teams with exceptional temporary and permanent talent.

Visit us at to learn more and view our open positions.

Please apply or call one of us to learn more

For further inquiries regarding the following opportunity, please contact one of our Talent Specialists.

Arun
Amit at
Title: Cyber Security Analyst - Level IV - Remote
Location: Remote
Duration: 12 Months

Only W2 candidates are eligible for this position. Third-party or C2C candidates will not be considered.

Description

This role will support security hygiene and control effectiveness by strengthening identity and endpoint controls, assuring logging and telemetry, identifying and validating our external attack surface, and delivering clear metrics and reports.

Core responsibilities include:

  • Identity and Account Governance
    • Analyze usage patterns (service/admin) to identify inactive/inappropriate use; ensure authorizers are designated for in-scope accounts
    • Coordinate and verify password resets for user and service accounts for cause; enforce MFA and least privilege for applicable populations
    • Review and triage approval requests for new access/accounts; validate against policy and control requirements
  • Endpoint and Telemetry Hygiene
    • Evaluate EDR installation and coverage; identify systems without EDR and drive remediation to closure with IT owners
    • Verify required event logging is enabled and flowing (SIEM parsing/normalization checks); flag and remediate gaps with platform owners
  • External Attack Surface and Public Access Assurance
    • Monitor external attack surface for unapproved/undocumented systems and newly disclosed vulnerabilities
    • Review systems with public access to ensure required controls (e.g., event logging, MFA) are properly implemented and required information is documented
  • Operational Triage and Case Management
    • Triage unusual access or phishing reports; investigate suspicious activity or poor configurations and orchestrate appropriate responses
    • Maintain thorough notes; produce concise summaries for technical and executive audiences (e.g., backlog trends, MTTD/MTTR, false positive rates where applicable)
  • Process, Playbooks, and Continuous Improvement
    • Execute existing playbooks with minimal assistance; identify gaps and propose practical improvements
    • Support light automation to reduce repetitive manual tasks (e.g., routine account hygiene checks), consistent with shift-left principles to bake in controls and reduce bottlenecks

You will be expected to use a variety of tools to perform the above tasks, including ServiceNow, CrowdStrike EDR, CrowdStrike Identity Protection, Azure/M365, Splunk, and other tools.

Objectives:

The ideal candidate will support the projects and tasks associated with the Cybersecurity Program.

Technical Direction of Work:

Report to the Deputy Chief Information Security Officer within the Business & Information Services division; including daily guidance and collaboration with others in the Cyber Security Program Office (CSPO).

Task and Time Reporting:

The project managers measure work performed by the contractor on a task basis. The tasks typically represent 8 to 80 hours of effort with performance being measured at the completion of each of the assigned tasks. Hours will be recorded on a weekly time sheet; progress against planned tasks will be reported weekly or bi-weekly, at the discretion of the Deputy CISO.

Typically, the work is performed remotely. For the candidate within driving distance of the Lab, there may be rare times to be onsite for in-person meetings, assessments, or presentations. Most of the Business Information Services (BIS) Division works remotely and are rarely onsite. If the candidate is out of state, too far away from the Lab, onsite meetings are not feasible to attend and not required.

Expectation/Deliverables:

Deliverables and Outcomes

  • Identity governance reports (inactive/inappropriate use, authorizer designations, MFA/privileged account hygiene) with remediation tracking
  • Endpoint and telemetry coverage metrics (EDR deployment %, logging completeness, parsing/normalization health, asset/identity tagging quality)
  • External attack surface findings and remediation outcomes (unapproved/undocumented system disposition; vulnerability response status)
  • Playbook execution and improvements documented; adoption of light automation for repetitive tasks
  • Operational metrics and communications (backlog burn-down, case summaries; MTTD/MTTR where applicable) ]
  • Risk/control alignment notes referencing CSF functions and 800-53 families (e.g., AC, IA, AU, CM, IR)

Expectations

  • Collaborate with CSPO staff, system/network administrators, and platform owners; communicate clearly with technical and executive audiences
  • Align work products to client's incident response and reporting procedures
  • Focus on control assurance and hygiene; leverage automation to reduce effort where feasible
  • Provide knowledge transfer and contribute to improving runbooks and handoffs

Minimum Qualifications

  • 2 4 years in cybersecurity operations (blue team) with hands-on identity/account governance, endpoint hygiene, logging/telemetry assurance, and case management
  • Strong grasp of TCP/IP, OSI model, and common protocols; Windows/Linux/macOS fundamentals; Active Directory/Entra ID concepts; basic logging
  • Experience with CrowdStrike Falcon or Splunk; ability to craft queries and reports; comfort with regex, JSON, APIs; basic scripting (Python/PowerShell/Bash)
  • Excellent analytical, problem-solving, and communication skills; project-oriented mindset in a remote environment

Preferred Qualifications

  • Experience with Splunk SPL, CrowdStrike Falcon and Identity Protection, ServiceNow, and an External Attack Surface Management tool.
  • Cloud security exposure (e.g., CloudTrail/GuardDuty, Azure/M365 Defender)
  • Basic forensics/network analysis (host triage, timelines, artifact review)
  • Understanding of the NIST Cybersecurity Framework and NIST SP 800-53 controls; able to tie deliverables to control outcomes
  • Certifications: Security+, CySA+, SSCP; Microsoft SC-200/AZ-500; Splunk; GIAC; cloud provider security certs

Experience-

  • Experience in system and network administration.
  • Staying up to date with the latest cybersecurity threats, vulnerabilities, and best practices.
  • Strong analytical and problem-solving skills.
  • Meticulous attention to detail to ensure thorough assessments and accurate reporting.
  • Excellent written and verbal communication skills to effectively convey findings and recommendations to technical and non-technical stakeholders.
  • Ability to work collaboratively with other cybersecurity professionals, IT staff, and external vendors.
  • Considerable knowledge/experience of assessing security controls.
  • Experience and skill in conducting audits or reviews of technical systems.
  • Experience working in a government environment.
  • Experience working in a distributed IT environment.
  • Ability to qualify for HSPD-12 card for use in two-factor authentication.
  • Able to work both independently and as a contributing member of a small technical team
  • Able to disseminate knowledge to current staff.

Government-Furnished Property:

  • Client will supply a government-furnished laptop, PIV Card, and PIV Card reader.

Computer Protection Program:

The contractor shall adhere to all policies and procedures of the contract Computer Protection Program, must not bypass any procedures established to protect data, applications, hardware, or communications at client, must maintain a work environment that will satisfy audit, privacy, and protection requirements, and must report any findings of inadequacies to the technical contact and the BIS Computer Protection Program Representative.

Security Requirements:

  • The Cyber Security Program Office follows the National Institute of Standards and Technology (NIST) Cyber Security Framework. All subcontracts, where applicable, will work within the same requirements as though the subcontractor was part of the Laboratory's cyber program.
  • Client's Cyber Security Program requires that all persons who access sensitive data or applications must learn and adhere to protection requirements of the data or application, must not bypass procedures established to protect data and applications, and must immediately report any findings of inadequacies in protection procedures to the Cyber Security Program Office
  • In cases where staffing is required, vetting of identity (NIST 800-63 Identity Assurance Level 3) and strong authentication (NIST 800-63 Authentication Assurance Level 3) will be required. Client uses the HSPD-12 smart card for staff relationships that last longer than 6 months.
  • Client may provide relevant information requested from the vendor or remote access as required to gather information. U.S. citizenship will be required for any access to systems or data.
  • The manager of the contract and the Cyber Security Program Office must approve authorization for remote work.

The following expectations are part of working remote:

  • Working remotely outside of scheduled times requires supervisor approval prior to performing that remote work.
  • While working remotely, just like when onsite, all scheduled meetings must be attended (using approved remote communication tools).
  • The candidate must be available for consultation during all scheduled work time, reachable by email, phone, chat, or other approved means.
  • Performance will be monitored to determine productivity for remote work at least matches that when onsite. If performance and deliverables decline, remote work may be suspended.
  • Should a situation arise that requires the candidate to be onsite while scheduled to work remotely, accommodation will be made to reschedule the remote work, if desired.
  • The remote work privilege may be revoked at any time at the discretion of client
  • A flexible work schedule may also be possible if the schedule is agreed to by the candidate and approved by the supervisor and sponsor.
  • Should the laboratory close operations due to weather or other circumstances, remote work is preferred.
  • Lastly, the candidate must track their remote work schedule into the CSPO absence calendar and be approved by CSPO supervisor.

Place of Performance:

Work will be performed remotely (within the confines of the United States of America), and team communication will be done through Microsoft tools such as Microsoft Teams and Microsoft Outlook.

About us:
DivIHN, the 'IT Asset Performance Services' organization, provides Professional Consulting, Custom Projects, and Professional Resource Augmentation services to clients in the Mid-West and beyond. The strategic characteristics of the organization are Standardization, Specialization, and Collaboration.

DivIHN is an equal opportunity employer. DivIHN does not and shall not discriminate against any employee or qualified applicant on the basis of race, color, religion (creed), gender, gender expression, age, national origin (ancestry), disability, marital status, sexual orientation, or military status.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.