Certified Woman & Minority Owned

Cybersecurity Analyst


Reference Number: BTILCA24

Cybersecurity Analyst
experience  Not Disclosed
location  Lemont , IL (100% Remote)
duration  12.0 Months
salary  Not Disclosed
jobtype  Not Disclosed
Industry  Engineering
duration  $-4/hour - $1/hour
Job Description

100% remote.

Description:

The client is seeking a full-time Cybersecurity Analyst to support security hygiene and control effectiveness.

Scope:
This role will support security hygiene and control effectiveness by strengthening identity and endpoint controls, assuring logging and telemetry, identifying and validating our external attack surface, and delivering clear metrics and reports.

Core responsibilities include:

Identity and Account Governance
Analyze usage patterns (service/admin) to identify inactive/inappropriate use; ensure authorizers are designated for in-scope accounts
Coordinate and verify password resets for user and service accounts for cause; enforce MFA and least privilege for applicable populations
Review and triage approval requests for new access/accounts; validate against policy and control requirements

Endpoint and Telemetry Hygiene
Evaluate EDR installation and coverage; identify systems without EDR and drive remediation to closure with IT owners
Verify required event logging is enabled and flowing (SIEM parsing/normalization checks); flag and remediate gaps with platform owners

External Attack Surface and Public Access Assurance
Monitor external attack surface for unapproved/undocumented systems and newly disclosed vulnerabilities
Review systems with public access to ensure required controls (e.g., event logging, MFA) are properly implemented and required information is documented

Operational Triage and Case Management
Triage unusual access or phishing reports; investigate suspicious activity or poor configurations and orchestrate appropriate responses
Maintain thorough notes; produce concise summaries for technical and executive audiences (e.g., backlog trends, MTTD/MTTR, false positive rates where applicable)

Process, Playbooks, and Continuous Improvement
Execute existing playbooks with minimal assistance; identify gaps and propose practical improvements
Support light automation to reduce repetitive manual tasks (e.g., routine account hygiene checks), consistent with shift-left principles to bake in controls and reduce bottlenecks

You will be expected to use a variety of tools to perform the above tasks, including ServiceNow, CrowdStrike EDR, CrowdStrike Identity Protection, Azure/M365, Splunk, and other tools.

Objectives:
The ideal candidate will support the projects and tasks associated with the Cybersecurity Program.

Technical Direction of Work:
Report to the Deputy Chief Information Security Officer within the Business & Information Services division; including daily guidance and collaboration with others.

Expectation/Deliverables:

Deliverables and Outcomes
Identity governance reports (inactive/inappropriate use, authorizer designations, MFA/privileged account hygiene) with remediation tracking
Endpoint and telemetry coverage metrics (EDR deployment %, logging completeness, parsing/normalization health, asset/identity tagging quality)
External attack surface findings and remediation outcomes (unapproved/undocumented system disposition; vulnerability response status)
Playbook execution and improvements documented; adoption of light automation for repetitive tasks
Operational metrics and communications (backlog burn-down, case summaries; MTTD/MTTR where applicable) ]
Risk/control alignment notes referencing CSF functions and 800-53 families (e.g., AC, IA, AU, CM, IR)

Expectations
Collaborate with CSPO staff, system/network administrators, and platform owners; communicate clearly with technical and executive audiences
Align work products to client’s incident response and reporting procedures
Focus on control assurance and hygiene; leverage automation to reduce effort where feasible
Provide knowledge transfer and contribute to improving runbooks and handoffs

Minimum Qualifications
2–4 years in cybersecurity operations (blue team) with hands-on identity/account governance, endpoint hygiene, logging/telemetry assurance, and case management
Strong grasp of TCP/IP, OSI model, and common protocols; Windows/Linux/macOS fundamentals; Active Directory/Entra ID concepts; basic logging
Experience with CrowdStrike Falcon or Splunk; ability to craft queries and reports; comfort with regex, JSON, APIs; basic scripting (Python/PowerShell/Bash)
Excellent analytical, problem-solving, and communication skills; project-oriented mindset in a remote environment

Preferred Qualifications
Experience with Splunk SPL, CrowdStrike Falcon and Identity Protection, ServiceNow, and an External Attack Surface Management tool.
Cloud security exposure (e.g., CloudTrail/GuardDuty, Azure/M365 Defender)
Basic forensics/network analysis (host triage, timelines, artifact review)
Understanding of the NIST Cybersecurity Framework and NIST SP 800-53 controls; able to tie deliverables to control outcomes
Certifications: Security+, CySA+, SSCP; Microsoft SC-200/AZ-500; Splunk; GIAC; cloud provider security certs

Experience
Experience in system and network administration.
Staying up to date with the latest cybersecurity threats, vulnerabilities, and best practices.
Strong analytical and problem-solving skills.
Meticulous attention to detail to ensure thorough assessments and accurate reporting.
Excellent written and verbal communication skills to effectively convey findings and recommendations to technical and non-technical stakeholders.
Ability to work collaboratively with other cybersecurity professionals, IT staff, and external vendors.
Considerable knowledge/experience of assessing security controls.
Experience and skill in conducting audits or reviews of technical systems.
Experience working in a government environment.
Experience working in a distributed IT environment.
Ability to qualify for HSPD-12 card for use in two-factor authentication.
Able to work both independently and as a contributing member of a small technical team
Able to disseminate knowledge to current staff.

Computer Protection Program:
The contractor shall adhere to all policies and procedures of the client Computer Protection Program, must not bypass any procedures established to protect data, applications, hardware, or communications at the client, must maintain a work environment that will satisfy audit, privacy, and protection requirements, and must report any findings of inadequacies to the technical contact and the BIS Computer Protection Program Representative.

The following expectations are part of working remote:
Working remotely outside of scheduled times requires supervisor approval prior to performing that remote work.
While working remotely, just like when onsite, all scheduled meetings must be attended (using approved remote communication tools).
The candidate must be available for consultation during all scheduled work time, reachable by email, phone, chat, or other approved means.
Performance will be monitored to determine productivity for remote work at least matches that when onsite. If performance and deliverables decline, remote work may be suspended.
Should a situation arise that requires the candidate to be onsite while scheduled to work remotely, accommodation will be made to reschedule the remote work, if desired.
The remote work privilege may be revoked at any time at the discretion of the client.
A flexible work schedule may also be possible if the schedule is agreed to by the candidate and approved by the supervisor and sponsor.
Should the client close operations due to weather or other circumstances, remote work is preferred.
Lastly, the candidate must track their remote work schedule into the client absence calendar and be approved by client supervisor.

Notes:
100% remote.
40 hours per week
Typically, the work is performed remotely. For the candidate within driving distance of the Lab, there may be rare times to be onsite for in-person meetings, assessments, or presentations. Team communication will be done through Microsoft tools such as Microsoft Teams and Microsoft Outlook.


VIVA is an equal opportunity employer. All qualified applicants have an equal opportunity for placement, and all employees have an equal opportunity to develop on the job. This means that VIVA will not discriminate against any employee or qualified applicant on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status

Apply for this Job





(Please ensure email matches your resume email)



(document types allowed: doc/docx/rtf/pdf/txt) (max 2MB)

By submitting this form, you are consenting to the VIVA team contacting you via Phone/Email

Join VIVA and grow

VIVA is faster, easier and you still have complete control