Information Security Analysts (Cyber Watch Operations Certified Analyst) Intermediate

Nexagen Networks

Not Interested
Bookmark
Report This Job

profile Job Location:

Rock Island, IL - USA

profile Monthly Salary: Not Disclosed
Posted on: 3 days ago
Vacancies: 1 Vacancy

Job Summary

Information Security Analyst (Cyber Watch Operations Certified Analyst) Intermediate

Security Clearance Requirement: Current and Active DoD Secret

Salary Range: $80K $100K

(The salary range provided is a general guideline. Nexagen Networks considers various factors when determining base salary offers including the scope and responsibilities of the position as well as the candidates experience education skills and current market conditions.)

As an Information Security Analyst you will join a high-performing team dedicated to excellence innovation and mission-critical cybersecurity operations. At Nexagen you will play a key role in protecting critical systems and supporting national security initiatives. With outstanding benefits and unparalleled growth prospects you will thrive in our collaborative and innovative environment.

Nexagen Networks is a trusted partner to the Department of Defense (DoD) and other federal agencies including the Army Air Force Marine Corps Navy and DHS. With more than 20 years of industry expertise we deliver exceptional lifecycle professional services spanning Research and Development Cloud Engineering Digital Modernization Systems and Software Engineering DevSecOps ITSM Cybersecurity Satellite Communication (SATCOM) RMF-FedRAMP Logistics Training Exercises COMSEC and IT/Networking.

Job Description

Nexagen Networks is seeking a skilled Information Security Analyst to support cybersecurity operations within a Security Operations Center (SOC) environment. This role involves monitoring detecting analyzing and responding to security incidents while ensuring compliance with DoD cybersecurity policies and frameworks.

The ideal candidate will have experience working with cybersecurity tools threat detection and RMF processes and will be comfortable operating in a fast-paced mission-critical environment.

Position Responsibilities

  • Support the development review and maintenance of RMF authorization packages including SSPs SOPs TTPs and supporting artifacts within eMASS
  • Assist with ATO acquisition renewal and continuous monitoring activities ensuring documentation meets DoD Information Assurance requirements
  • Conduct security control assessments including STIG reviews vulnerability scans and compliance checks documenting results in POA&Ms
  • Monitor system security posture and cyber events identifying vulnerabilities and recommending risk-based mitigations
  • Ensure audit logs monitoring data and incident records are properly collected reviewed and maintained
  • Maintain accurate and up-to-date security documentation aligned with RMF and eMASS requirements
  • Assist with remediation and risk reduction activities tracking POA&M items through closure
  • Track cybersecurity training requirements and ensure compliance with DoD and Army standards
  • Prepare reports on system security posture risks and compliance status for leadership
  • Support incident response procedures and threat analysis using industry-standard tools and methodologies

Qualifications

  • Bachelors degree in Cybersecurity Information Technology Computer Science or related field preferred
  • 5 years of relevant experience (AA with 7 years acceptable in lieu of degree)
  • Active DoD Secret security clearance required
  • DoD 8570/8140 compliant certification (Security required)
  • Experience with RMF eMASS ATO processes and continuous monitoring
  • Knowledge of Federal Acquisition Regulation (FAR) and DoD cybersecurity policies
  • Hands-on experience with network technologies (Unix/Windows OS Cisco/Juniper)
  • Strong understanding of TCP/IP protocols network analysis and anomaly detection
  • Experience with SIEM tools and CND analyst toolsets for threat detection and response
  • Ability to analyze threats vulnerabilities and implement mitigation strategies
  • Strong organizational analytical and communication skills

Company Benefits

At Nexagen we believe in taking care of our team from day one! Enjoy comprehensive benefits including health dental and vision insurance generous paid time off a matching 401(k) and various support programs. We also offer professional development opportunities and additional perks to ensure you thrive both personally and professionally. Join us and experience the difference with benefits that start on your first day!

Our Culture

Join our dynamic team and thrive in a culture that champions flexibility professional growth and work-life balance. At Nexagen we support your continuous learning with comprehensive training and educational reimbursement. We celebrate your achievements and focus on delivering exceptional value to our customers. Be part of a supportive environment where your contributions directly impact our customers success and propel your career forward.

The application period for the job is estimated to be 20 days from the job posting date. However this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.

Nexagen Networks Inc. is an Equal Opportunity Employer. All qualified applicants are encouraged to apply and will receive consideration for employment without regard to race color religion sex sexual orientation gender identity national origin disability or veteran status. #zr


Required Experience:

IC

Information Security Analyst (Cyber Watch Operations Certified Analyst) IntermediateSecurity Clearance Requirement: Current and Active DoD SecretSalary Range: $80K $100K(The salary range provided is a general guideline. Nexagen Networks considers various factors when determining base salary offers...
View more view more

About Company

Company Logo

Nexagen Networks Inc. customer delivery is backed by our ISO 9001:2015 and CMMI L3 certifications. We utilize Systems Engineering and Agile Methodologies to solving complex technical and programmatic problems.

View Profile View Profile