Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
IT Security and Compliance Analyst image - Rise Careers
Job details

IT Security and Compliance Analyst

Company Description

Ashburn Consulting, a Small Business based in the Washington, DC metropolitan area, specializes in providing network and network security solutions in complex environments to a select set of government and business clients. The company, an established leader in its field, is composed of an elite team of engineers and business consultants, each of whom is recognized —and highly regarded—within the network and security communities.

Job Description

We are seeking a highly motivated Security Compliance Analyst to oversee the development, implementation, and maintenance of security policies and procedures to ensure compliance with industry standards and regulations. This role will involve conducting regular security assessments, responding to security incidents, monitoring security technologies, and ensuring the organization remains in compliance with frameworks such as NIST 800-53. The ideal candidate will have strong expertise in cybersecurity principles, vulnerability management, and security technologies. 

Key Responsibilities: 

  • Incident Reporting: Immediately report any security incidents to the Information Systems Security Officer (ISSO) and IT Service Group (ITSG) leadership. Ensure timely and accurate documentation of all incidents for future analysis and reporting. 

  • Policy and Procedure Development: Develop, implement, and maintain the organization's information security policies, procedures, and standards to ensure robust protection of sensitive data and compliance with relevant regulations. 

  • Security Assessments: Conduct regular security assessments, vulnerability scans, and risk assessments to identify and mitigate potential security risks across systems, applications, and networks. 

  • Monitoring Security Technologies: Monitor and manage security technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus solutions, and encryption mechanisms to detect and respond to threats in real-time. 

  • Security Control Audits: Perform regular audits of security controls for access management, identity and authentication systems, and data protection mechanisms to ensure compliance with security policies and standards. 

  • Incident Response: Respond to and investigate security incidents, coordinating with incident response teams when necessary. Conduct root cause analysis to understand the source of incidents and implement corrective actions. 

  • Compliance and Regulatory Adherence: Ensure compliance with all relevant regulations, standards, and frameworks (e.g., NIST 800-53, FISMA, HIPAA, etc.). Work with other teams to achieve and maintain security certifications and assessments. 

  • Security Awareness Training: Provide security awareness training to end-users, including conducting periodic drills to ensure readiness in the event of a security breach or threat. 

  • Emerging Threats and Technologies: Stay updated on emerging cybersecurity threats, vulnerabilities, technologies, and best practices. Recommend and implement new security measures and tools as necessary. 

  • Documentation: Document all security configurations, incident responses, risk assessments, and compliance status reports for internal and external auditing purposes. Ensure records are up-to-date and easily accessible. 

  • Vulnerability Scanning and Reporting: Regularly scan for vulnerabilities and exploits within the organization’s systems, reporting findings to NOAA Cybersecurity and coordinating the response to identified issues. 

Qualifications

Required Skills & Qualifications: 

  • Relevant Certifications: Industry-recognized certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), CompTIA Security+, or equivalent certifications are required. 

  • Cybersecurity Knowledge: In-depth knowledge of cybersecurity principles, practices, and technologies. Familiarity with various cybersecurity tools and solutions (e.g., firewalls, IDS/IPS, encryption). 

  • Security Technologies Expertise: Experience with security technologies, including firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), antivirus software, and encryption protocols. 

  • Access Control and Data Protection: Strong understanding of access control technologies, identity management systems, and data protection methods to ensure security of sensitive information. 

  • Security Risk Management: Proven ability to perform security assessments, vulnerability scans, and risk assessments to identify security weaknesses and implement remediation actions. 

  • Compliance and Regulatory Adherence: Ensure compliance with all relevant regulations, standards, and frameworks (e.g., NIST 800-53, FISMA, HIPAA, etc.). Work with IT operations teams and system administrators to review, implement, and revise processes, procedures, and system configurations to achieve and maintain system security and compliance. 

  • Security Technologies Expertise: Experience with the implementation, purpose and user of security technologies, including firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), antivirus software, and encryption protocols in an enterprise IT environment. 

  • Experience with Virtual Environments: Hands-on experience managing and securing virtualized IT systems and ensuring their compliance with secure configuration standards such as STIGs. 

Preferred Qualifications: 

  • Advanced Certifications: Additional certifications such as Certified Ethical Hacker (CEH), CompTIA Cybersecurity Analyst (CySA+), or other advanced certifications are a plus. 

  • Experience with Security Tools: Familiarity with security information and event management (SIEM) tools and security orchestration and automation platforms. 

  • Cloud Security Knowledge: Experience securing cloud environments (AWS, Azure, etc.) and understanding cloud-specific risks and controls. 

  • Experience with Virtual Environments: Hands-on experience configuring and securing virtual machines (VMs) and ensuring their compliance with security standards such as STIGs. 

 

  1. In-depth knowledge of cybersecurity principles, practices, and technologies.  

  1. Strong knowledge of IT compliance frameworks such as NIST 800-53, FISMA, etc. 

  1. Experience conducting or supporting security assessments 

 

Additional Information

Equal Opportunity Employer/Veterans/Disabled. An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status

Ashburn Consulting is an Equal Opportunity Affirmative Action Employer.
In compliance with the American with Disabilities Act Amendments Act (ADAAA), if you have a disability and would like to request and accommodation in order to apply for a position with Ashburn Consulting, please e-mail [email protected].”

 

Average salary estimate

$75000 / YEARLY (est.)
min
max
$60000K
$90000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About IT Security and Compliance Analyst, Ashburn Consulting

Are you ready to take your cybersecurity career to the next level? Ashburn Consulting, a small yet powerful player in the IT security realm based in Washington, DC, is seeking an enthusiastic IT Security and Compliance Analyst. This position is tailor-made for someone who is passionate about creating robust security policies and ensuring compliance with industry standards. In this dynamic role, you'll get to dive deep into the world of security assessments, incident reporting, and policy creation, all while working with an elite team recognized in the security community. Your responsibilities will include monitoring security technologies, conducting audits, and responding thoughtfully to security incidents. Moreover, you’ll develop and maintain our security policies, ensuring our compliance with critical frameworks like NIST 800-53. We’re looking for someone who’s not just well-versed in cybersecurity principles but also has a knack for vulnerability management and security technologies. Your expertise will guide us in protecting sensitive data and staying ahead of emerging threats. If you hold relevant certifications and are eager to provide security awareness training, while fostering a safer tech environment, Ashburn Consulting is ready for you. It's not just a job; it's a commitment to keeping our government and business clients secure. Join us and contribute to a mission where your skills can truly shine!

Frequently Asked Questions (FAQs) for IT Security and Compliance Analyst Role at Ashburn Consulting
What responsibilities can I expect as an IT Security and Compliance Analyst at Ashburn Consulting?

As an IT Security and Compliance Analyst with Ashburn Consulting, you'll play a key role in developing and implementing security policies and procedures. You'll conduct regular security assessments, manage incident reporting, and monitor security technologies. Your expertise will ensure that the organization maintains compliance with frameworks like NIST 800-53, making your work critical to our mission of protecting sensitive data.

Join Rise to see the full answer
What qualifications are necessary for the IT Security and Compliance Analyst position at Ashburn Consulting?

To qualify for the IT Security and Compliance Analyst role at Ashburn Consulting, candidates should possess relevant certifications such as CISSP, CISM, or CompTIA Security+. A strong understanding of cybersecurity principles, access control technologies, and risk management practices is essential. Familiarity with compliance frameworks including FISMA and HIPAA will also be beneficial.

Join Rise to see the full answer
How does Ashburn Consulting support ongoing learning for their IT Security and Compliance Analysts?

Ashburn Consulting highly values continuous learning and development. As an IT Security and Compliance Analyst, you will have access to training sessions, workshops, and advanced certification programs that will not only enhance your skills but also help you keep up with the latest trends in cybersecurity and compliance.

Join Rise to see the full answer
Can you describe the team dynamics for the IT Security and Compliance Analyst at Ashburn Consulting?

At Ashburn Consulting, the IT Security and Compliance Analyst will be part of a tight-knit, elite team composed of engineers and consultants. Collaboration and open communication are paramount, enabling you to share insights and learn from one another as you tackle complex security challenges together. This supportive environment fosters professional growth and innovation.

Join Rise to see the full answer
What is the importance of compliance for Ashburn Consulting's IT Security and Compliance Analysts?

Compliance is a cornerstone of Ashburn Consulting's operational framework, especially for the IT Security and Compliance Analyst role. Your work will involve ensuring full adherence to regulations like NIST 800-53 and FISMA, safeguarding sensitive data for our clients. This responsibility underscores the critical nature of your position in protecting information and maintaining the trust of our government and business clients.

Join Rise to see the full answer
Common Interview Questions for IT Security and Compliance Analyst
What experience do you have with compliance frameworks needed for the IT Security and Compliance Analyst role?

In your response, highlight your experience with frameworks such as NIST 800-53 and FISMA. Articulate specific instances where you have contributed to compliance projects or assessments, including the processes followed and results achieved.

Join Rise to see the full answer
Can you describe an incident you managed as part of your previous role?

Share a detailed account of a security incident you were involved in, explaining your role in detection, response, and resolution. Discuss the challenges you faced and how you adapted your approach for better outcomes.

Join Rise to see the full answer
How do you stay updated with emerging cybersecurity threats and technologies?

Discuss specific resources, forums, or continuing education opportunities that you follow to stay abreast of cybersecurity trends. Mention any certifications or training you've pursued to enhance your knowledge in this field.

Join Rise to see the full answer
What methods do you use when conducting security assessments?

Detail the methodologies you apply during security assessments, including any tools you utilize for vulnerability scans. Highlight your approach to both identifying threats and suggesting remediation strategies.

Join Rise to see the full answer
How would you train non-technical staff on security awareness?

Explain your strategy for imparting security awareness to end-users, including the importance of engaging training programming. Share examples of drills, workshops, or communication you’ve previously conducted.

Join Rise to see the full answer
Can you explain the role of vulnerability scanning in your previous positions?

Describe your hands-on experience with vulnerability scanning, emphasizing the tools you've used. Discuss how you interpreted findings and the actions taken to remediate detected vulnerabilities.

Join Rise to see the full answer
What do you consider the biggest challenges facing cybersecurity today?

Articulate your thoughts on current cybersecurity challenges, perhaps focusing on evolving threats, regulatory changes, or the impact of emerging technologies. Discuss how you would navigate these issues in your work.

Join Rise to see the full answer
How do you prioritize and manage multiple security incidents?

Share your method for prioritizing security incidents based on their severity and impact. Discuss the tools or frameworks you utilize to streamline your response process and ensure effective incident management.

Join Rise to see the full answer
What is your understanding of incident response planning?

Explain the key components of incident response planning and why it's vital for an organization. Share any experiences where you developed or contributed to incident response plans.

Join Rise to see the full answer
Have you ever worked with a SIEM tool? How did it enhance your security operations?

Discuss your experience with Security Information and Event Management (SIEM) tools, focusing on how they improved your ability to detect, respond, and manage security incidents efficiently. Share specific scenarios where SIEM played a critical role.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 3 days ago
Photo of the Rise User
Posted 20 hours ago
Photo of the Rise User
Posted 2 days ago
Photo of the Rise User
Posted 13 days ago
Vision Insurance
Dental Insurance
Performance Bonus
Paid Holidays
Photo of the Rise User
Posted 7 days ago
Photo of the Rise User
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Take Risks
Casual Dress Code
Startup Mindset
Emails over Meetings
Collaboration over Competition
Fast-Paced
Growth & Learning
Medical Insurance
Paid Time-Off
Maternity Leave
Mental Health Resources
Equity
Mixe-Ability Accomodations
Work Visa Sponsorship
Commuter Benefits
Employee Resource Groups
Performance Bonus
Health Savings Account (HSA)
Flexible Spending Account (FSA)
Photo of the Rise User
Fireworks AI Remote No location specified
Posted 7 days ago

Ashburn Consulting provides an industry-leading suite of Network and Security Engineering services and solutions to Federal, State and Local government, as well as commercial clients. The Company possesses unique domain knowledge, technical expert...

5 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
March 21, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Dayton just viewed Sr Renewal Analyst 1730 at MeridianLink
Photo of the Rise User
52 people applied to Jr SOC Analyst at IBM
Photo of the Rise User
38 people applied to SOC Analyst I at Epsilon
Photo of the Rise User
Someone from OH, Canton just viewed Communications Manager at Shearer's Foods
Photo of the Rise User
Someone from OH, Akron just viewed BDR Lead at Pontera
Photo of the Rise User
Someone from OH, Akron just viewed SDR Manager at Darktrace
Photo of the Rise User
Someone from OH, Columbus just viewed Health & Wellness Account Coordinator at PNOE
Photo of the Rise User
Someone from OH, Columbus just viewed Warehouse Associate - Third Shift at Babylist
Photo of the Rise User
7 people applied to ITSM Specialist at Datacom
Photo of the Rise User
9 people applied to Security Analyst Jr at DEUNA
B
Someone from OH, Athens just viewed Associate Production Designer at Brooks Running
Photo of the Rise User
Someone from OH, Cleveland just viewed Graphic Designer for UX/UI Portfolio Mockups at Upwork
Photo of the Rise User
Someone from OH, Dublin just viewed Product Designer (Ambient AI) at Commure + Athelas
V
Someone from OH, Cleveland just viewed Product Designer (UX/UI) at VML Enterprise Solutions
Photo of the Rise User
Someone from OH, Cleveland just viewed Need an expert UI/UX designer ( for long term) at Upwork
Photo of the Rise User
Someone from OH, Cleveland just viewed US Product Designer at Praxent
Photo of the Rise User
Someone from OH, Cleveland just viewed UX / UI Designer at DocPlanner
Photo of the Rise User
Someone from OH, Columbus just viewed Cyber Analyst, Digital Forensics Incident Response at At-Bay
P
Someone from OH, Marion just viewed Customer Experience Agent at ProjectGrowth
Photo of the Rise User
Someone from OH, Wilmington just viewed Accounts Receivable Specialist at Flock Safety