logo inner

Information Security Analyst

cfocussoftwareWorldwideRemote
cFocus Software is seeking an experienced
Information Security Analyst with 8+ years of experience to support the development, implementation, and monitoring of security measures that protect computer networks and information. The selected candidate will be responsible for ensuring appropriate security controls are in place to safeguard digital files and critical electronic infrastructure. This position also involves responding to security breaches and handling viruses, as well as maintaining DHS’s commitment to national security by continuously monitoring and improving its cybersecurity posture.

Key Responsibilities:


  • Security Planning and Implementation:
  • Plan, implement, and manage security measures for the protection of computer networks, systems, and information in compliance with DHS policies and federal regulations.
  • Design and deploy security architecture for networks and systems, ensuring that all digital assets are protected against unauthorized access, attacks, and data breaches.
  • Develop, update, and enforce security policies and procedures for systems and data management, ensuring alignment with industry standards and best practices.
  • Security Monitoring and Upgrades:
  • Monitor security networks and systems continuously to detect vulnerabilities, suspicious activity, or potential security threats.
  • Proactively assess and upgrade existing security measures, technologies, and tools to ensure that DHS systems remain secure in the face of emerging threats.
  • Implement automated tools and procedures to track network activity and identify any potential vulnerabilities or threats in real-time.
  • Incident Response and Breach Management:
  • Respond to and investigate security incidents, including data breaches, malware infections, and viruses, in a timely and effective manner.
  • Collaborate with other cybersecurity professionals and relevant stakeholders to contain and mitigate the impact of security breaches, ensuring minimal disruption to DHS operations.
  • Conduct forensic analysis of security incidents, document findings, and recommend corrective actions to prevent future breaches.
  • Security Audits and Risk Management:
  • Conduct regular security audits, vulnerability assessments, and penetration tests to evaluate the effectiveness of current security measures and identify areas for improvement.
  • Evaluate potential risks to the security of the organization’s digital infrastructure and recommend solutions to mitigate these risks.
  • Maintain and monitor security logs and records to track compliance with DHS security standards and federal cybersecurity regulations.
  • Collaboration and Reporting:
  • Work closely with IT teams, security architects, and other departments to ensure the integration of secure technologies and practices across all levels of DHS infrastructure.
  • Provide regular updates to leadership and key stakeholders on the status of cybersecurity initiatives, vulnerabilities, and incident response efforts.
  • Prepare and present reports on security issues, incidents, and ongoing improvement initiatives, including compliance status with industry standards.
  • Continuous Improvement and Training:
  • Stay current on the latest cybersecurity trends, threats, and technologies, and recommend improvements to existing security practices.
  • Develop and deliver training programs to staff on cybersecurity best practices, ensuring that all employees are educated on how to minimize risks and comply with DHS security policies.
  • Ensure compliance with federal regulations, including FISMA, NIST, and other relevant cybersecurity frameworks.

Qualifications:


  • Education:
  • Bachelor’s degree in Information Security, Computer Science, Cybersecurity, or a related field. Equivalent work experience may be considered in lieu of formal education.
  • Experience:
  • 8+ years of experience in cybersecurity, information security, or a related field, with expertise in network security, incident response, and digital infrastructure protection.
  • Extensive experience in implementing, monitoring, and managing security controls, including firewalls, encryption, access controls, and security software.
  • Demonstrated experience in responding to security breaches, conducting root cause analysis, and implementing corrective measures to prevent future incidents.
  • Proficiency in security management tools, intrusion detection systems (IDS), firewalls, and anti-malware technologies.
  • Hands-on experience with penetration testing, vulnerability assessments, and network security monitoring.
  • Skills and Competencies:
  • Strong knowledge of network security protocols, encryption methods, and risk management principles.
  • Ability to analyze complex security incidents and provide actionable insights for mitigation and remediation.
  • In-depth understanding of cybersecurity regulations and frameworks such as NIST, FISMA, and FedRAMP.
  • Excellent problem-solving, critical thinking, and analytical skills.
  • Strong communication and interpersonal skills, with the ability to effectively collaborate with technical and non-technical stakeholders.
  • Proven ability to stay calm and act decisively during security incidents or breaches.
  • Certifications (Preferred):
  • Certified Information Systems Security Professional (CISSP) or equivalent security certification.
  • Certified Ethical Hacker (CEH) or Certified Information Security Manager (CISM).
  • GIAC Security Essentials (GSEC) or other relevant cybersecurity certifications.
  • CompTIA Security+ or other foundational cybersecurity certifications.

Security Clearance:


Due to the sensitive nature of this role, candidates must possess or be able to obtain the required security clearance.

Your tracker settings

We use cookies and similar methods to recognize visitors and remember their preferences. We also use them to measure ad campaign effectiveness, target ads and analyze site traffic. To learn more about these methods, including how to disable them, view our Cookie Policy or Privacy Policy.

By tapping `Accept`, you consent to the use of these methods by us and third parties. You can always change your tracker preferences by visiting our Cookie Policy.

logo innerThatStartupJob
Discover the best startup and their job positions, all in one place.
Copyright © 2024