Cyber Security Program Analyst

Aiken, SC, United States

Apply now Apply later

Overview

The Cyber Security Program Analyst provides cyber security support for the Enterprise Information Services for the Department of Energy (DOE) Savannah River Operations Office (DOE-SR), at the Savannah River Site (SRS) in Aiken, SC. This position leads the Cyber Security Assessment Team (CSAT) and is responsible for assisting in the planning, development, and review of Computer Security Program Management planning activities in support of DOE oversight role, and support to the Authorizing Official Designated Representative (AODR) in the development and coordination of Boundary Security Risk Assessments, Accreditation approvals, certifications of systems and program corrective action. This role is critical in ensuring that Governance, Risk and Compliance (GRC) functions are incorporated into key security services and Risk Assessment programs, while validating risk mitigation functions through analysis and Security Assessments across the DOE Enterprise.

Responsibilities

• This role will include leveraging knowledge of security policies, standards, controls, and industry best practices to consult with partners across the DOE complex• Will be involved in playing a critical role in ensuring that Governance, Risk and Compliance (GRC) functions are incorporated into key security services and program while validating risk mitigation functions are functioning correctly.• Document and assist others in documenting security domain specific policies, standards, controls, control operating procedures.• Liaise with GRC and stakeholders to ensure alignment between all groups.• Must take ambiguous high-level language and translate it into real world operations.• Diplomatically influence teams to implement a Governance Framework showing the value it will bring and tactfully help adjust existing operations to align with the framework.• Stay current on information security technologies, trends, standards and best practices.• Develop and understand Information Technology (IT)/cybersecurity strategies, policies, and guidelines for secure implementations• Assess policy needs and collaborate with stakeholders to develop policies to govern IT/cyber activities• Review, conduct, or participate in audits of cyber programs and projects• Support management in the formulation of IT/cyber-related policies and provide expertise to course of action development• Develop, implement, and recommend changes to appropriate planning procedures and policies• Facilitate the sharing of “best practices” and “lessons learned” throughout the IT/ cyber operations community• Provide subject matter expertise to planning teams, coordination groups, exercise, and task forces as necessary• Provide input for the development and refinement of the IT/cyber operations objectives, priorities, strategies, plans, and programs• Document lessons learned that convey the results of events and/or exercises• Initiate, develop, and work data audits by collecting and reviewing all requirements and ensuring the correct information and data are prepared for team lead. Supporting and improving internal controls and data projects.• Assist in developing data briefings for high-level executives.• Assist with development of internal organization policies and procedures, which affect cross-functional activities and best practices.• Create SOPs, including process maps, for developed dashboards and reporting procedures.• Research of emerging technologies that have potential for exploitation and the impact on systems• Provide and leverage industry best practices and lessons learned of external organizations and academic institutions dealing with cyber issues• Analyze and assess internal and external partner (i.e., EM-HQ, DOE OCIO) cyber operations capabilities and tools.• Assist DOE-SR Cyber Security with developing and maintenance of Cyber Lab.• Develop and perform Cyber Security Awareness training• Develop outcome-based measures (metrics) to determine the effectiveness and efficiency of the cyber security program and security controls

 

Knowledge, Skills and Abilities:

• Attention-to-detail is critical, proven ability to look closely at your work to identify and correct errors, spot and improve weaknesses and produce a near-perfect end-result.• Ability to identify problems, brainstorm and analyze answers, and implement the best solutions.• Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise. Participate as a member of planning teams, coordination groups, and task forces as necessary• Ability to socialize and influence others to buy into a process-oriented approach to their work.• Ability to gain a deep level of technical and process knowledge across multiple security domains in a short amount of time.• Ability to think both strategically and tactically to enable a better future state while continuing to execute against current milestones• Demonstrate independent ability to research, study, workflow and other means implementing automated processes for various DOE requests.• Demonstrate experience working with business intelligence/reporting systems such as Tableau, Business Objects, Microsoft Excel, SharePoint and other Office products.• Must be able to interpret technology status or issues and communicate and translate into well written business updates for senior management.• Able to prepare effective presentations that illustrate strategic landscape of the portfolio (big picture mentality)• Advanced skills in managing large data files and applying analytic skills to represent overall status or trends• Advanced user of Excel, PowerPoint, Visio; other applications desired• Able to navigate through large organizations to streamline and summarize multiple information points; create repeatable process to build consistency in presenting information.• Strong inter-personal skills a must• Knowledge of governance frameworks such as COBIT, ITIL, NIST, FEA, CPIC, TBM and/or ISO 27000• Knowledge of current and emerging cyber technologies and the Application Security Risks including attack methods and techniques (DDoS, brute force, spoofing, etc.)• Awareness of cyber actions (i.e., cyber defense, information gathering, environment preparation, cyber-attack) principles, capabilities, limitations, and effects• Awareness of federal cyber operations programs, strategies, frameworks, processes and resources• Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization• Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities• Knowledge of cyber threats and vulnerabilities and the operational impacts of cybersecurity lapses• Knowledge of fundamental IT/cyber concepts, principles, limitations, facilitating technologies and methods, terminology/lexicon, and effects• Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means as well as conducting presentations and meetings. Able to tailor technical and planning information to a• customer’s level of understanding• Must be able to write and edit technical documents with little to no supervision.• Must have excellent written and verbal communication skills with the ability to communicate with colleagues with varying levels of technical expertise.• Comfortable working with ambiguity is a must.• Exceptional communication skills, including the ability to gather relevant data and information, actively listen, dialogue freely, verbalize ideas effectively, negotiate tense situations successfully, and manage and resolve conflict.• Demonstrated understanding in the application of the NIST Cyber Security Framework and related security controls and frameworks (i.e., NIST, CIS, DISA/ STIG)• Component and working knowledge of Tableau, Excel, and Microsoft Office software• Strong working and technical knowledge of data protection technologies, including Digital Rights Management (DRM) and Data Loss Prevention (DLP)• Strong ability to translate strategic vision and objectives into real world operations• Proven ability to think logically and strategically about technical solutions that are efficient, scalable, and re-usable.• Excellent analytical and problem-solving skills and strong attention to detail.• Proven ability to identify and develop clear and understandable performance measures from high-level business objectives.• Strong business acumen to quickly learn new business processes and understand how application performance requirements support the business in achieving mission objectives.• IT Audit, internal Audit and/or risk advisory experience is a plus.• Proven presentation and facilitation skills.• Demonstrated expertise of building a consensus across business partners and technology leaders and influencing successful outcomes.• Must excel working in team-oriented roles that rely on ability to collaborate with others.

 

Qualifications

Clearance: • Must possess (or be able to obtain) a “Q” level security clearance.

 

Education: • Bachelor’s Degree in Computer Science, Cyber Security or related field.

 

Experience: (Not a junior position, Suggest Adding): • Must have 10 years of relevant information assurance experience.• At least 3 years Defensive Cyberspace Operations (DCO) or Cyber Protection Team experience• At least one year of documenting and implementing security policies, standards, and/or controls• Experience operating and maintaining IAM, DLP, and/or VM infrastructure, leading or participating in their day-to-day operations and maintenance, as well as monitoring, reporting, and auditing technical, security, and business activities.• Experience working as a Business Systems Analyst on multiple projects and business functions is a plus.• Experience working successfully in a highly matrixed work environment.

 

Certification:

• CISA, CRISC, CISSP, or CISM certifications beneficial. • Other IAT/IAM Level I, II & III Certifications will be beneficial.

 

 

 

AAP/EEO Statement

Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  1  0
Category: Analyst Jobs

Tags: Application security Audits Business Intelligence CISA CISM CISSP Clearance COBIT Compliance Computer Science CRISC Cyber defense DCO DDoS DISA Governance IAM ISO 27000 ITIL Monitoring NIST Risk assessment Security assessment Security Clearance SharePoint Strategy Vulnerabilities

Perks/benefits: Career development Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.