This role is responsible for monitoring detecting analyzing and responding to security events managing vulnerabilities and ensuring compliance with federal agency and organizational security requirements (NIST FISMA IRS Pub 1075 CMS SSA). The analyst will also support audit readiness maintain the System Security Plan (SSP) and lead targeted security awareness initiatives.
Key Responsibilities
Security Operations & Monitoring
- Conduct continuous monitoring of enterprise systems using CrowdStrike (EDR) Splunk (SIEM) and Tenable (Vulnerability Management).
- Detect investigate and respond to potential threats and incidents impacting CUI and overall system security.
- Maintain dashboards alerts and reports to ensure proactive detection and escalation of risks.
Vulnerability & Risk Management
- Perform ongoing vulnerability assessments with Tenable track remediation efforts and validate closure of findings.
- Support patch management and configuration management processes to reduce the attack surface.
- Deliver metrics and risk posture updates to leadership.
Compliance & Documentation
- Maintain and update System Security Plans (SSPs) to document the implementation of security controls.
- Support external and internal audits (IRS CMS SSA NIST FISMA) by providing required evidence documentation and remediation tracking.
- Assist in compliance with evolving frameworks (e.g. NIST SP 800-53 Rev. 5).
Incident Response
- Triage analyze and document security incidents across enterprise systems.
- Coordinate with IT and business stakeholders on containment eradication and recovery efforts.
- Deliver incident reports root cause analysis and lessons learned documentation.
Security Awareness & Training
- Develop and deliver security awareness programs emphasizing CUI handling phishing defense and insider threat mitigation.
- Conduct specialized training for privileged users and administrators.
- Track participation and report effectiveness of awareness initiatives.
Reporting & Communication
- Provide leadership with actionable insights through Splunk dashboards Tenable vulnerability reports and CrowdStrike incident summaries.
- Deliver executive-level updates highlighting risks compliance status and incident trends.
- Track remediation activities and ensure timely closure of findings.
Required Qualifications
- Bachelors degree in information security Cybersecurity IT or related field; or equivalent 1 year; or Preference will be given to candidates with relevant State of Georgia Experience
- Hands-on experience with Splunk CrowdStrike Falcon and Tenable Nessus/.
- Strong understanding of CUI protection requirements and compliance frameworks (NIST FISMA IRS Pub 1075 CMS SSA).
- Experience with incident response vulnerability management and risk assessments.
- Strong analytical documentation and communication skills.
| Skill | Required / Desired | Amount | of Experience |
| Bachelors degree in information security Cybersecurity IT or related field; or equivalent 1 year; State of GA experience Preference. | Required | | |
| Hands-on experience with Splunk CrowdStrike Falcon and Tenable Nessus/. | Required | | |
| Strong understanding of CUI protection requirements and compliance frameworks (NIST FISMA IRS Pub 1075 CMS SSA). | Required | | |
| Experience with incident response vulnerability management and risk assessments. | Required | 1 | Years |
| Strong analytical documentation and communication skills. | Required | 1 | Years |
| Professional certifications (e.g. CompTIA Security CySA CISSP CISM GIAC). (MUST UPLOAD CERTIFICATION) | Highly desired | | |
| Experience managing System Security Plans (SSPs) and supporting audit readiness. | Highly desired | | |
| Familiarity with cloud and endpoint security technologies. | Highly desired | | |
| Prior experience delivering security awareness training. | Highly desired | | |
This role is responsible for monitoring detecting analyzing and responding to security events managing vulnerabilities and ensuring compliance with federal agency and organizational security requirements (NIST FISMA IRS Pub 1075 CMS SSA). The analyst will also support audit readiness maintain the Sy...
This role is responsible for monitoring detecting analyzing and responding to security events managing vulnerabilities and ensuring compliance with federal agency and organizational security requirements (NIST FISMA IRS Pub 1075 CMS SSA). The analyst will also support audit readiness maintain the System Security Plan (SSP) and lead targeted security awareness initiatives.
Key Responsibilities
Security Operations & Monitoring
- Conduct continuous monitoring of enterprise systems using CrowdStrike (EDR) Splunk (SIEM) and Tenable (Vulnerability Management).
- Detect investigate and respond to potential threats and incidents impacting CUI and overall system security.
- Maintain dashboards alerts and reports to ensure proactive detection and escalation of risks.
Vulnerability & Risk Management
- Perform ongoing vulnerability assessments with Tenable track remediation efforts and validate closure of findings.
- Support patch management and configuration management processes to reduce the attack surface.
- Deliver metrics and risk posture updates to leadership.
Compliance & Documentation
- Maintain and update System Security Plans (SSPs) to document the implementation of security controls.
- Support external and internal audits (IRS CMS SSA NIST FISMA) by providing required evidence documentation and remediation tracking.
- Assist in compliance with evolving frameworks (e.g. NIST SP 800-53 Rev. 5).
Incident Response
- Triage analyze and document security incidents across enterprise systems.
- Coordinate with IT and business stakeholders on containment eradication and recovery efforts.
- Deliver incident reports root cause analysis and lessons learned documentation.
Security Awareness & Training
- Develop and deliver security awareness programs emphasizing CUI handling phishing defense and insider threat mitigation.
- Conduct specialized training for privileged users and administrators.
- Track participation and report effectiveness of awareness initiatives.
Reporting & Communication
- Provide leadership with actionable insights through Splunk dashboards Tenable vulnerability reports and CrowdStrike incident summaries.
- Deliver executive-level updates highlighting risks compliance status and incident trends.
- Track remediation activities and ensure timely closure of findings.
Required Qualifications
- Bachelors degree in information security Cybersecurity IT or related field; or equivalent 1 year; or Preference will be given to candidates with relevant State of Georgia Experience
- Hands-on experience with Splunk CrowdStrike Falcon and Tenable Nessus/.
- Strong understanding of CUI protection requirements and compliance frameworks (NIST FISMA IRS Pub 1075 CMS SSA).
- Experience with incident response vulnerability management and risk assessments.
- Strong analytical documentation and communication skills.
| Skill | Required / Desired | Amount | of Experience |
| Bachelors degree in information security Cybersecurity IT or related field; or equivalent 1 year; State of GA experience Preference. | Required | | |
| Hands-on experience with Splunk CrowdStrike Falcon and Tenable Nessus/. | Required | | |
| Strong understanding of CUI protection requirements and compliance frameworks (NIST FISMA IRS Pub 1075 CMS SSA). | Required | | |
| Experience with incident response vulnerability management and risk assessments. | Required | 1 | Years |
| Strong analytical documentation and communication skills. | Required | 1 | Years |
| Professional certifications (e.g. CompTIA Security CySA CISSP CISM GIAC). (MUST UPLOAD CERTIFICATION) | Highly desired | | |
| Experience managing System Security Plans (SSPs) and supporting audit readiness. | Highly desired | | |
| Familiarity with cloud and endpoint security technologies. | Highly desired | | |
| Prior experience delivering security awareness training. | Highly desired | | |
View more
View less