VG Systems LLC
Cybersecurity Analyst Intermediate
VG Systems LLC, Fort George Meade, Maryland, United States
Overview
VG Systems, LLC, a HUBZone small business based in Quantico, VA, is seeking a Cybersecurity Analyst (Intermediate) to support our federal IT and cybersecurity operations at Fort Meade, MD. This full-time role is ideal for a motivated professional with hands-on experience in monitoring, threat detection, vulnerability management, and cybersecurity compliance. Responsibilities
Monitor and analyze security events using SIEM platforms such as Splunk, ELK, and Microsoft Sentinel to detect intrusions, anomalies, and malware activity. Conduct forensic investigations on suspicious network activity and support incident triage and resolution. Conduct vulnerability scanning, analyze results, validate patches, and coordinate remediation with system owners. Develop, update, and maintain cybersecurity baseline documentation (e.g., CONOPS, Incident Response Plans, SOPs, PPPs). Assess applicability of IAVMs, STIGs, and SRGs; track remediation efforts and document compliance. Support development and maintenance of RMF accreditation packages, including evidence collection, compliance validation, and POA&M development. Apply RMF controls and assist with Authority to Operate (ATO) documentation. Provide inputs for monthly/quarterly security status reports and IA briefings. Document incident response actions and create after-action reports for leadership review. Assist senior engineers and analysts with risk assessments and corrective action planning. Participate in cybersecurity inspections (CCRI, SAV) by preparing documentation and supporting on-site assessments. Support red/blue team exercises and improve SOC playbooks for faster containment and recovery. Ensure cybersecurity requirements are fully integrated into system lifecycle processes. Assist with configuration reviews, log management, and system baseline checks across hybrid cloud environments. Enforce Zero Trust-aligned data governance and access models. Integrate AI-enabled analytics into SOC workflows for faster detection and automated threat forecasting. Develop Python and PowerShell scripts to automate security log parsing, vulnerability reporting, and alert notifications. Maintain all position-based Standard Operating Procedures (SOPs) and update them as needed or requested. Qualifications
Required: Active Secret clearance. 35 years of relevant IA/cybersecurity experience. Bachelors degree in Cybersecurity, Computer Science, Information Technology, or related field (or four additional years of relevant experience in lieu of degree). DoD 8570 IAT Level II certification (e.g., Security+ CE, CySA+, GSEC, or equivalent). Experience with DISA IA processes, eMASS, ACAS, and STIG/SRG compliance. Strong knowledge of DoD RMF, NIST 800-53, DISA STIGs, and Zero Trust architectures. Hands-on experience with security tools including Splunk, ArcSight, ELK, Microsoft Sentinel, Wireshark, Snort, and Nessus. Proficiency in automation and scripting using Python, PowerShell, or Microsoft Power Automate. Experience with cloud platforms such as Microsoft Azure Government, Microsoft 365, and AWS GovCloud. Detail-oriented, dependable, and able to work independently. Desired:
Familiarity with FISMA reporting and NIST RMF processes. Experience supporting DISA CCRI/SAV inspections. Strong written and oral communication skills for Government reporting. Equal Opportunity Employer/Veterans/Disabled #J-18808-Ljbffr
VG Systems, LLC, a HUBZone small business based in Quantico, VA, is seeking a Cybersecurity Analyst (Intermediate) to support our federal IT and cybersecurity operations at Fort Meade, MD. This full-time role is ideal for a motivated professional with hands-on experience in monitoring, threat detection, vulnerability management, and cybersecurity compliance. Responsibilities
Monitor and analyze security events using SIEM platforms such as Splunk, ELK, and Microsoft Sentinel to detect intrusions, anomalies, and malware activity. Conduct forensic investigations on suspicious network activity and support incident triage and resolution. Conduct vulnerability scanning, analyze results, validate patches, and coordinate remediation with system owners. Develop, update, and maintain cybersecurity baseline documentation (e.g., CONOPS, Incident Response Plans, SOPs, PPPs). Assess applicability of IAVMs, STIGs, and SRGs; track remediation efforts and document compliance. Support development and maintenance of RMF accreditation packages, including evidence collection, compliance validation, and POA&M development. Apply RMF controls and assist with Authority to Operate (ATO) documentation. Provide inputs for monthly/quarterly security status reports and IA briefings. Document incident response actions and create after-action reports for leadership review. Assist senior engineers and analysts with risk assessments and corrective action planning. Participate in cybersecurity inspections (CCRI, SAV) by preparing documentation and supporting on-site assessments. Support red/blue team exercises and improve SOC playbooks for faster containment and recovery. Ensure cybersecurity requirements are fully integrated into system lifecycle processes. Assist with configuration reviews, log management, and system baseline checks across hybrid cloud environments. Enforce Zero Trust-aligned data governance and access models. Integrate AI-enabled analytics into SOC workflows for faster detection and automated threat forecasting. Develop Python and PowerShell scripts to automate security log parsing, vulnerability reporting, and alert notifications. Maintain all position-based Standard Operating Procedures (SOPs) and update them as needed or requested. Qualifications
Required: Active Secret clearance. 35 years of relevant IA/cybersecurity experience. Bachelors degree in Cybersecurity, Computer Science, Information Technology, or related field (or four additional years of relevant experience in lieu of degree). DoD 8570 IAT Level II certification (e.g., Security+ CE, CySA+, GSEC, or equivalent). Experience with DISA IA processes, eMASS, ACAS, and STIG/SRG compliance. Strong knowledge of DoD RMF, NIST 800-53, DISA STIGs, and Zero Trust architectures. Hands-on experience with security tools including Splunk, ArcSight, ELK, Microsoft Sentinel, Wireshark, Snort, and Nessus. Proficiency in automation and scripting using Python, PowerShell, or Microsoft Power Automate. Experience with cloud platforms such as Microsoft Azure Government, Microsoft 365, and AWS GovCloud. Detail-oriented, dependable, and able to work independently. Desired:
Familiarity with FISMA reporting and NIST RMF processes. Experience supporting DISA CCRI/SAV inspections. Strong written and oral communication skills for Government reporting. Equal Opportunity Employer/Veterans/Disabled #J-18808-Ljbffr