-
Cybersecurity Analyst - Jr
- ASM Research, An Accenture Federal Services Company (Germantown, MD)
-
The Cybersecurity Specialist provides targeted expertise in monitoring, compliance, incident response, and vulnerability management. This role ensures that cybersecurity tools, processes, and reporting mechanisms are effectively implemented and aligned with DOE and federal requirements. The candidate will have varied experience with specific cybersecurity domains, supporting both operational teams and leadership with actionable insights and technical guidance.
Key Responsibilities:
1. Cybersecurity Performance Management
+ Support the implementation of cybersecurity metrics programs, including data collection, analysis, and reporting.
+ Review and apply OIM guidance, policy, and best practices to ensure compliance with federal cybersecurity performance requirements.
+ Assist in developing new processes where existing ones do not meet risk mitigation standards.
2. Cybersecurity Operations
+ Strong technical writing skills for supporting various cyber deliverables
+ Monitor SIEM, IDS/IPS, EDR, DLP, ICAM, CDM, and cloud security tools for indicators of compromise.
+ Analyze alerts, incidents, and reports to identify trends, vulnerabilities, and potential threats.
+ Provide daily cyber health and status updates to leadership.
+ Search and Dashboard Development: Creating complex searches, reports, dashboards, and alerts to visualize data, identify trends, monitor system health, and detect security incidents.
+ Support incident response activities, including containment, eradication, recovery, and documentation.
+ Liaise with SOCaaS providers and DOE iJC3 to coordinate incident handling and escalation.
+ Assist in forensic analysis of digital media and preparation of After Action Reports (AARs).
3. Continuous Diagnostics and Mitigation (CDM)
+ Maintain and update CDM tools, ensuring continuous monitoring of unauthorized hardware/software.
+ Provide analysis of CDM tool outputs to support compliance with DOE Orders and regulations.
+ Collaborate with contractors and vendors to integrate updates and enhancements.
4. Vulnerability Management & Mitigation
+ Conduct vulnerability scans and assessments across IT and cloud environments.
+ Evaluate vulnerabilities based on severity and recommend mitigation strategies.
+ Support patch management, configuration updates, and corrective actions.
+ Monitor threat intelligence feeds to identify emerging risks.
+ Prepare reports on vulnerability management activities, compliance status, and recommendations.
Minimum Qualifications
+ Bachelor’s degree in Cybersecurity, Information Technology, or related field.
+ 3–5 years of experience in cybersecurity operations, monitoring, or compliance.
+ Proficiency with SIEM, IDS/IPS, EDR, DLP, ICAM, CDM, and vulnerability scanning tools.
+ Familiarity with DOE cybersecurity policies, FISMA, NIST 800-53, and federal directives.
+ Certifications such as Security+, CySA+, CEH, or equivalent.
Other Job Specific Skills
+ Strong analytical skills for interpreting security data and identifying trends.
+ Effective communication skills for reporting incidents and compliance findings.
+ Ability to collaborate across IT, engineering, and operations teams.
+ Detail-oriented with strong documentation practices.
+ Adaptability to evolving threats and emerging technologies.
+ Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
+ Knowledge of malware analysis concepts and methodologies.
+ Skill of identifying, capturing, containing, and reporting malware.
+ Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
+ Solid understanding of IR operations, including familiarity with IR tools, experience with documenting and following operational procedures, and strong writing and communications skills.
+ Investigates and responds to security incidents, analyze the scope and impact of breaches, and developing mitigation strategies.
+ Comfortable crafting and refining detection rules, leveraging SIEM platforms, query languages, and has a solid understanding of scripting language to assist in developing new detection mechanisms.
Compensation Ranges
Compensation ranges for ASM Research positions vary depending on multiple factors; including but not limited to, location, skill set, level of education, certifications, client requirements, contract-specific affordability, government clearance and investigation level, and years of experience. The compensation displayed for this role is a general guideline based on these factors and is unique to each role. Monetary compensation is one component of ASM's overall compensation and benefits package for employees.
EEO Requirements
It is the policy of ASM that an individual's race, color, religion, sex, disability, age, sexual orientation or national origin are not and will not be considered in any personnel or management decisions. We affirm our commitment to these fundamental policies.
All recruiting, hiring, training, and promoting for all job classifications is done without regard to race, color, religion, sex, disability, or age. All decisions on employment are made to abide by the principle of equal employment.
Physical Requirements
The physical requirements described in "Knowledge, Skills and Abilities" above are representative of those which must be met by an employee to successfully perform the primary functions of this job. (For example, "light office duties' or "lifting up to 50 pounds" or "some travel" required.) Reasonable accommodations may be made to enable individuals with qualifying disabilities, who are otherwise qualified, to perform the primary functions.
Disclaimer
The preceding job description has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications required of employees assigned to this job.
$79k - $107k
EEO Requirements
It is the policy of ASM that an individual's race, color, religion, sex, disability, age, gender identity, veteran status, sexual orientation or national origin are not and will not be considered in any personnel or management decisions. We affirm our commitment to these fundamental policies.
All recruiting, hiring, training, and promoting for all job classifications is done without regard to race, color, religion, sex, veteran status, disability, gender identity, or age. All decisions on employment are made to abide by the principle of equal employment.
-
Recent Jobs
-
Cybersecurity Analyst - Jr
- ASM Research, An Accenture Federal Services Company (Germantown, MD)