Cybersecurity Analyst - Senior Law Enforcement & Security - Chambersburg, PA at Geebo

Cybersecurity Analyst - Senior


Job Description
We are seeking a highly motivated and experienced Senior Cybersecurity Analyst to join our dynamic team. As a Senior Cybersecurity Analyst, you will play a critical role in analyzing and managing cybersecurity data to ensure the organization's IT infrastructure and data are protected from cyberattacks. You will collaborate with source data owners and existing capability providers to develop standardized and open code-based capability to ingest, normalize, transfer, and load data from identified sources. You will also develop graphical representations that present status clearly and in simple formats, allowing for drill-down capabilities to provide specific details and reporting in a manner that allows specific selection of data fields.
Key Tasks and Responsibilities
Analyze status data from a variety of sources, including Axonious, RMF control status, asset data, audit information, vulnerability data, scans, and access controls.
Collaborate and coordinate with source data owners and existing capability providers to develop standardized and open code-based capability to ingest, normalize, transfer, and load data from identified sources and eliminate duplicative manual data entry requirements.
Develop graphical representations that present status clearly and in simple formats, allowing for drill-down capabilities to provide specific details and reporting in a manner that allows specific selection of data fields.
Create the strategy and associated documentation for moving data into the identified centralized repository, and for maintaining accurate data, inclusive of appropriate tagging and labeling.
Perform other duties as assigned.


Education & Experience
Expertise with MS SharePoint including expert knowledge of HTML, CSS, JavaScript JQuery languages, and SharePoint Framework Extension.
Knowledge of REST, Chef, Ansible, Python, Windows DSC, CSOM, JSOM, and SP Services Application Programming Interfaces APIs is required.
Experience with data extraction, transfer, and load processes from and to a variety of sources.
Experience with Open Security Controls Assessment Language, XML, JavaScript Object Notation, and Yet Another Markup Language (YAML)
Ability to create/implement the data integration strategy and the documentation associated with moving data from various data sources into a centralized data repository.
Ability to ensure data integrity is maintained.
Ability to work independently and help drive the mission.
Certifications
DoD 8570 IAT Level III
Security Clearance
DoD Secret, Top Secret, or SCI clearance may be required
Other (Travel, Work Environment, DoD 8570 Requirements, Administrative Notes, etc.)
Hybrid/remote work may be authorized
Computer World Services is an affirmative action and equal employment opportunity employer. Current employees and/or qualified applicants will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, disability, protected veteran status, genetic information or any other characteristic protected by local, state, or federal laws, rules, or regulations.
Computer World Services is committed to the full inclusion of all qualified individuals. As part of this commitment, Computer World Services will ensure that individuals with disabilities (IWD) are provided reasonable accommodations. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact Aaron McClellan in Human Resources at
314.952.5138
or
IND1
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.