Cyber Security Program Analyst

Apply Now

Company: Delaware Nation Industries

Location: Aiken, SC 29803

Description:

Overview

The Cyber Security Program Analyst provides cyber security support for the Enterprise Information Services for the Department of Energy (DOE) Savannah River Operations Office (DOE-SR), at the Savannah River Site (SRS) in Aiken, SC. This position leads the Cyber Security Assessment Team (CSAT) and is responsible for assisting in the planning, development, and review of Computer Security Program Management planning activities in support of DOE oversight role, and support to the Authorizing Official Designated Representative (AODR) in the development and coordination of Boundary Security Risk Assessments, Accreditation approvals, certifications of systems and program corrective action. This role is critical in ensuring that Governance, Risk and Compliance (GRC) functions are incorporated into key security services and Risk Assessment programs, while validating risk mitigation functions through analysis and Security Assessments across the DOE Enterprise.

Responsibilities
This role will include leveraging knowledge of security policies, standards, controls, and industry best practices to consult with partners across the DOE complex
Will be involved in playing a critical role in ensuring that Governance, Risk and Compliance (GRC) functions are incorporated into key security services and program while validating risk mitigation functions are functioning correctly.
Document and assist others in documenting security domain specific policies, standards, controls, control operating procedures.
Liaise with GRC and stakeholders to ensure alignment between all groups.
Must take ambiguous high-level language and translate it into real world operations.
Diplomatically influence teams to implement a Governance Framework showing the value it will bring and tactfully help adjust existing operations to align with the framework.
Stay current on information security technologies, trends, standards and best practices.
Develop and understand Information Technology (IT)/cybersecurity strategies, policies, and guidelines for secure implementations
Assess policy needs and collaborate with stakeholders to develop policies to govern IT/cyber activities
Review, conduct, or participate in audits of cyber programs and projects
Support management in the formulation of IT/cyber-related policies and provide expertise to course of action development
Develop, implement, and recommend changes to appropriate planning procedures and policies
Facilitate the sharing of "best practices" and "lessons learned" throughout the IT/ cyber operations community
Provide subject matter expertise to planning teams, coordination groups, exercise, and task forces as necessary
Provide input for the development and refinement of the IT/cyber operations objectives, priorities, strategies, plans, and programs
Document lessons learned that convey the results of events and/or exercises
Initiate, develop, and work data audits by collecting and reviewing all requirements and ensuring the correct information and data are prepared for team lead. Supporting and improving internal controls and data projects.
Assist in developing data briefings for high-level executives.
Assist with development of internal organization policies and procedures, which affect cross-functional activities and best practices.
Create SOPs, including process maps, for developed dashboards and reporting procedures.
Research of emerging technologies that have potential for exploitation and the impact on systems
Provide and leverage industry best practices and lessons learned of external organizations and academic institutions dealing with cyber issues
Analyze and assess internal and external partner (i.e., EM-HQ, DOE OCIO) cyber operations capabilities and tools.
Assist DOE-SR Cyber Security with developing and maintenance of Cyber Lab.
Develop and perform Cyber Security Awareness training
Develop outcome-based measures (metrics) to determine the effectiveness and efficiency of the cyber security program and security controls

Knowledge, Skills and Abilities:
Attention-to-detail is critical, proven ability to look closely at your work to identify and correct errors, spot and improve weaknesses and produce a near-perfect end-result.
Ability to identify problems, brainstorm and analyze answers, and implement the best solutions.
Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts-both internal and external to the organization-to leverage analytical and technical expertise. Participate as a member of planning teams, coordination groups, and task forces as necessary
Ability to socialize and influence others to buy into a process-oriented approach to their work.
Ability to gain a deep level of technical and process knowledge across multiple security domains in a short amount of time.
Ability to think both strategically and tactically to enable a better future state while continuing to execute against current milestones
Demonstrate independent ability to research, study, workflow and other means implementing automated processes for various DOE requests.
Demonstrate experience working with business intelligence/reporting systems such as Tableau, Business Objects, Microsoft Excel, SharePoint and other Office products.
Must be able to interpret technology status or issues and communicate and translate into well written business updates for senior management.
Able to prepare effective presentations that illustrate strategic landscape of the portfolio (big picture mentality)
Advanced skills in managing large data files and applying analytic skills to represent overall status or trends
Advanced user of Excel, PowerPoint, Visio; other applications desired
Able to navigate through large organizations to streamline and summarize multiple information points; create repeatable process to build consistency in presenting information.
Strong inter-personal skills a must
Knowledge of governance frameworks such as COBIT, ITIL, NIST, FEA, CPIC, TBM and/or ISO 27000
Knowledge of current and emerging cyber technologies and the Application Security Risks including attack methods and techniques (DDoS, brute force, spoofing, etc.)
Awareness of cyber actions (i.e., cyber defense, information gathering, environment preparation, cyber-attack) principles, capabilities, limitations, and effects
Awareness of federal cyber operations programs, strategies, frameworks, processes and resources
Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization
Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities
Knowledge of cyber threats and vulnerabilities and the operational impacts of cybersecurity lapses
Knowledge of fundamental IT/cyber concepts, principles, limitations, facilitating technologies and methods, terminology/lexicon, and effects
Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means as well as conducting presentations and meetings. Able to tailor technical and planning information to a
customer's level of understanding
Must be able to write and edit technical documents with little to no supervision.
Must have excellent written and verbal communication skills with the ability to communicate with colleagues with varying levels of technical expertise.
Comfortable working with ambiguity is a must.
Exceptional communication skills, including the ability to gather relevant data and information, actively listen, dialogue freely, verbalize ideas effectively, negotiate tense situations successfully, and manage and resolve conflict.
Demonstrated understanding in the application of the NIST Cyber Security Framework and related security controls and frameworks (i.e., NIST, CIS, DISA/ STIG)
Component and working knowledge of Tableau, Excel, and Microsoft Office software
Strong working and technical knowledge of data protection technologies, including Digital Rights Management (DRM) and Data Loss Prevention (DLP)
Strong ability to translate strategic vision and objectives into real world operations
Proven ability to think logically and strategically about technical solutions that are efficient, scalable, and re-usable.
Excellent analytical and problem-solving skills and strong attention to detail.
Proven ability to identify and develop clear and understandable performance measures from high-level business objectives.
Strong business acumen to quickly learn new business processes and understand how application performance requirements support the business in achieving mission objectives.
IT Audit, internal Audit and/or risk advisory experience is a plus.
Proven presentation and facilitation skills.
Demonstrated expertise of building a consensus across business partners and technology leaders and influencing successful outcomes.
Must excel working in team-oriented roles that rely on ability to collaborate with others.

Qualifications

Clearance:
Must possess (or be able to obtain) a "Q" level security clearance.

Education:
Bachelor's Degree in Computer Science, Cyber Security or related field.

Experience: (Not a junior position, Suggest Adding):
Must have 10 years of relevant information assurance experience.
At least 3 years Defensive Cyberspace Operations (DCO) or Cyber Protection Team experience
At least one year of documenting and implementing security policies, standards, and/or controls
Experience operating and maintaining IAM, DLP, and/or VM infrastructure, leading or participating in their day-to-day operations and maintenance, as well as monitoring, reporting, and auditing technical, security, and business activities.
Experience working as a Business Systems Analyst on multiple projects and business functions is a plus.
Experience working successfully in a highly matrixed work environment.

Certification:
CISA, CRISC, CISSP, or CISM certifications beneficial.
Other IAT/IAM Level I, II & III Certifications will be beneficial.

AAP/EEO Statement

Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.

Similar Jobs