Title: Cybersecurity Analyst
W-2 Only (no 1099)
Must be a U.S. Citizen
Company's Location: Lemont, IL
Job Description
Background:
Company promotes the safe and secure use of technology and providing a variety of cybersecurity services including consultation, protection technologies, detection technologies, cybersecurity education and awareness, cybersecurity incident management, vulnerability management, compliance, and cybersecurity risk management.
Contract Position: Full Time, 40 hour work week
Period of Performance: 1 Year
Job Description
Scope:
Cybersecurity Analyst will play an important role to continuously monitor, triage alerts and tickets, investigate suspicious activity or poor configurations, and orchestrate responses to protect the laboratory's systems and data. Typical tasks may include:
Resetting user passwords for cause (e.g., when they have been identified as being suspected compromised or 'known compromised')
You will be expected to use a variety of tools to perform the above tasks, including ServiceNow, CrowdStrike, and Splunk
Objectives:
The ideal candidate will support the projects and tasks associated with he Cybersecurity Program.
Technical Direction of Work:
Report to the Deputy Chief Information Security Officer within the Business & Information Services division; including daily guidance and collaboration with others in the Cyber Security Program Office (CSPO).
REMOTE:
Typically, the work is performed remotely. For the candidate within driving distance of the Lab, there may be rare times to be onsite for in-person meetings, assessments, or presentations. Most of the Business Information Services (BIS) Division works remotely and are rarely onsite. If the candidate is out of state, too far away from the Lab, onsite meetings are not feasible to attend and not required.
Expectation/Deliverables:
A candidate is expected to:
An improved candidate would also:
An excellent candidate would also:
Conduct proactive threat hunts; convert findings into new detections and control recommendations.
Create advanced use cases for detections based on an analysis of threats and data, including sample criteria to identify the behavior and mapping detections to MITRE Telecommunication&CK
Drive continuous improvements to existing processes or tooling.
Perform quality reviews and improve handoffs/runbooks.
Coach, guide, teach others on the team.
Lead investigations end-to-end (triage to containment), delivering timelines, root cause, scope, IOCs, and impacted assets.
Execute/coordinate containment and remediation (host isolation, credential resets, blocks) with proper approvals and verification.
Minimum Qualifications:
Preferred Additional Qualifications
Relevant certifications (nice to have): Security , CySA , SSCP; Microsoft SC-200/AZ-500; Splunk Core/Enterprise Security; GIAC (GCIH, GCIA, GCFA, GCTI); cloud provider security certs.
Experience:
Experience in system and network administration.
Staying up to date with the latest cybersecurity threats, vulnerabilities, and best practices.
Strong analytical and problem-solving skills.
Meticulous attention to detail to ensure thorough assessments and accurate reporting.
Excellent written and verbal communication skills to effectively convey findings and recommendations to technical and non-technical stakeholders.
Ability to work collaboratively with other cybersecurity professionals, IT staff, and external vendors.
Considerable knowledge/experience of assessing security controls.
Experience and skill in conducting audits or reviews of technical systems.
Experience working in a government environment.
Experience working in a distributed IT environment.
Ability to qualify for HSPD-12 card for use in two-factor authentication.
Able to work both independently and as a contributing member of a small technical team
Able to disseminate knowledge to current staff.
Government-Furnished Property:
Computer Protection Program:
The contractor shall adhere to all policies and procedures of the ANL Computer Protection Program, must not bypass any procedures established to protect data, applications, hardware, or communications at ANL, must maintain a work environment that will satisfy audit, privacy, and protection requirements, and must report any findings of inadequacies to the technical contact and the BIS Computer Protection Program Representative.
The following expectations are part of working remote:
Place of Performance :
Work will be performed remotely (within the confines of the United States of America), and team communication will be done through Microsoft tools such as Microsoft Teams and Microsoft Outlook.
Period of Performance
Work would begin in October 2025, for 40 hours per week for 1 year.