Job Description
Description
Cyber GRC Analyst specific duties and responsibilities may vary based on the organization's requirements and the individual's role within the team. This is a full-time remote job that can be worked anywhere within the US.
Key Responsibilities include:
- Correlation and analysis of cyberspace incident reports:
- A Cyber GRC Analyst collects and analyzes incident reports from various sources such as reliable sources, network sensors, vulnerability management devices, open-source information, and industry/government situational awareness reports. The goal is to identify and understand known adversary activities and their potential impact on the organization.
- Maintenance of an indicator database:
- The analyst uses expert knowledge of Named Areas of Interest (NAI) and advanced persistent threats (APTs) to review, analyze, and maintain the content of an indicator database. This database aids in the detection and mitigation of threat activities by providing relevant information for threat detection analysis and monitoring.
- Threat detection analysis and monitoring:
- The Cyber GRC Analyst utilizes commercial off-the-shelf (COTS) and government off-the-shelf (GOTS) analysis tools and their expertise to detect, analyze, and monitor cyber threat activities targeting the organization's network. This involves using various techniques such as advanced log analysis, forensics, network monitoring, network flow analysis, packet capture analysis, network proxies, firewalls, and anti-virus capabilities.
- Forensics analysis and understanding of attack vectors:
- The analyst possesses technical knowledge of forensics analysis to determine how adversaries exploit information system security controls, the use of malicious logic, and the lifecycle of network threats and attack vectors. This understanding helps in identifying the tactics, techniques, and procedures (TTPs) utilized by adversaries.
- Incident handling, trend analysis, and reporting:
- The Cyber GRC Analyst conducts incident handling and triage, network analysis, and threat detection. They analyze trends, develop metrics, and create reports on malicious activity. They also disseminate security vulnerability information to relevant stakeholders within the organization.
- Signature development for threat detection:
- The analyst assists the customer in developing signatures, which are patterns or indicators used to detect specific types of threats. This involves analyzing threat behavior and creating rules or signatures to enhance threat detection capabilities.
- Collaboration with the customer:
- The Cyber GRC Analyst works closely with the customer to understand their specific requirements and assists in developing metrics, trending/analysis reports, and security improvement recommendations.
Responsibilities:
- Lead the GRC team and oversee the onboarding of information systems into the GRC Qmulos Q-Compliance tool.
- Ensure compliance with security requirements and regulations to obtain Authority to Operate (ATO).
- Provide expert knowledge in Named Areas of Interest (NAI) and advanced persistent threats (APTs) for threat analysis and mitigation.
- Conduct risk and vulnerability assessments at the network, system, and application level.
- Develop and implement security controls and operational risk mitigations.
- Collaborate with stakeholders to establish security awareness programs.
Qualifications
Requirements:
- Must be a US Citizen.
- Must have a valid US Passport for OCONUS travel. Must have a willingness to travel CONUS and OCONUS at least 25% annually.
- Must have the ability to obtain a Secret clearance.
- Bachelors in a related field with 14 or more years of cyber experience, or Masters with 12 or more years of cyber experience.
- Strong knowledge of GRC processes, tools, and frameworks.
- Proficiency in threat modeling, risk assessment, and compliance standards.
- Excellent communication and leadership skills.
- Non-expired cyber security professional certification: CISSP, Security+, CCSP, or CISA (can be obtained on the job within 90 days of starting).
- A comprehensive background check is required to verify the credibility and suitability of candidates for cybersecurity positions, ensuring the protection of sensitive data and maintaining the highest standards of security.
- Working knowledge of Risk Management Framework (RMF), FedRAMP, and CNSSI 1253. Knowledge of ICD 503 a plus.
SAIC accepts applications on an ongoing basis and there is no deadline.
Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.
Overview
SAIC® is a premier Fortune 500® technology integrator driving our nation's technology transformation. Our robust portfolio of offerings across the defense, space, civilian, and intelligence markets includes secure high-end solutions in engineering, digital, artificial intelligence and mission solutions. Using our expertise and understanding of existing and emerging technologies, we integrate the best components from our own portfolio and our partner ecosystem to deliver innovative, effective and efficient solutions that are critical to achieving our customers' missions.
We are approximately 24,000 strong; driven by mission, united by purpose, and inspired by opportunities. SAIC is an Equal Opportunity Employer, fostering a culture of diversity, equity, and inclusion, which is core to our values and important to attract and retain exceptional talent. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $6.9 billion. For more information, visit saic.com. For ongoing news, please visit our newsroom.