Compunnel
Direct message the job poster from Compunnel Inc.
General Description
This role is responsible for monitoring, detecting, analyzing, and responding to security events, managing vulnerabilities, and ensuring compliance with federal, agency, and organizational security requirements (NIST, FISMA, IRS Pub 1075, CMS, SSA). The analyst will also support audit readiness, maintain the System Security Plan (SSP), and lead targeted security awareness initiatives. Key Responsibilities
Security Operations & Monitoring Conduct continuous monitoring of enterprise systems using CrowdStrike (EDR), Splunk (SIEM), and Tenable (Vulnerability Management). Detect, investigate, and respond to potential threats and incidents impacting CUI and overall system security. Maintain dashboards, alerts, and reports to ensure proactive detection and escalation of risks. Vulnerability & Risk Management Perform ongoing vulnerability assessments with Tenable, track remediation efforts, and validate closure of findings. Support patch management and configuration management processes to reduce the attack surface. Deliver metrics and risk posture updates to leadership. Compliance & Documentation Maintain and update
System Security Plans (SSPs)
to document the implementation of security controls. Support external and internal audits (IRS, CMS, SSA, NIST, FISMA) by providing required evidence, documentation, and remediation tracking. Assist in compliance with evolving frameworks (e.g.,
NIST SP 800-53 Rev. 5 ). Triage, analyze, and document security incidents across enterprise systems. Coordinate with IT and business stakeholders on containment, eradication, and recovery efforts. Deliver incident reports, root cause analysis, and lessons learned documentation. Security Awareness & Training Develop and deliver security awareness programs, emphasizing
CUI handling, phishing defense, and insider threat mitigation . Conduct specialized training for privileged users and administrators. Track participation and report effectiveness of awareness initiatives. Reporting & Communication Provide leadership with actionable insights through
Splunk dashboards, Tenable vulnerability reports, and CrowdStrike incident summaries . Deliver executive-level updates highlighting risks, compliance status, and incident trends. Track remediation activities and ensure timely closure of findings. Required Qualifications Bachelors degree in information security, Cybersecurity, IT, or related field; or equivalent
1 year ; or Preference will be given to candidates with relevant State of Georgia Experience Hands-on experience with
Splunk, CrowdStrike Falcon, and Tenable Nessus/Tenable.sc . Strong understanding of
CUI protection requirements
and compliance frameworks (NIST, FISMA, IRS Pub 1075, CMS, SSA). Experience with incident response, vulnerability management, and risk assessments. Strong analytical, documentation, and communication skills. #J-18808-Ljbffr
This role is responsible for monitoring, detecting, analyzing, and responding to security events, managing vulnerabilities, and ensuring compliance with federal, agency, and organizational security requirements (NIST, FISMA, IRS Pub 1075, CMS, SSA). The analyst will also support audit readiness, maintain the System Security Plan (SSP), and lead targeted security awareness initiatives. Key Responsibilities
Security Operations & Monitoring Conduct continuous monitoring of enterprise systems using CrowdStrike (EDR), Splunk (SIEM), and Tenable (Vulnerability Management). Detect, investigate, and respond to potential threats and incidents impacting CUI and overall system security. Maintain dashboards, alerts, and reports to ensure proactive detection and escalation of risks. Vulnerability & Risk Management Perform ongoing vulnerability assessments with Tenable, track remediation efforts, and validate closure of findings. Support patch management and configuration management processes to reduce the attack surface. Deliver metrics and risk posture updates to leadership. Compliance & Documentation Maintain and update
System Security Plans (SSPs)
to document the implementation of security controls. Support external and internal audits (IRS, CMS, SSA, NIST, FISMA) by providing required evidence, documentation, and remediation tracking. Assist in compliance with evolving frameworks (e.g.,
NIST SP 800-53 Rev. 5 ). Triage, analyze, and document security incidents across enterprise systems. Coordinate with IT and business stakeholders on containment, eradication, and recovery efforts. Deliver incident reports, root cause analysis, and lessons learned documentation. Security Awareness & Training Develop and deliver security awareness programs, emphasizing
CUI handling, phishing defense, and insider threat mitigation . Conduct specialized training for privileged users and administrators. Track participation and report effectiveness of awareness initiatives. Reporting & Communication Provide leadership with actionable insights through
Splunk dashboards, Tenable vulnerability reports, and CrowdStrike incident summaries . Deliver executive-level updates highlighting risks, compliance status, and incident trends. Track remediation activities and ensure timely closure of findings. Required Qualifications Bachelors degree in information security, Cybersecurity, IT, or related field; or equivalent
1 year ; or Preference will be given to candidates with relevant State of Georgia Experience Hands-on experience with
Splunk, CrowdStrike Falcon, and Tenable Nessus/Tenable.sc . Strong understanding of
CUI protection requirements
and compliance frameworks (NIST, FISMA, IRS Pub 1075, CMS, SSA). Experience with incident response, vulnerability management, and risk assessments. Strong analytical, documentation, and communication skills. #J-18808-Ljbffr