Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Information Security Analyst image - Rise Careers
Job details

Information Security Analyst

ECS is seeking an Information Security Analyst to work in our SEASIDE, CA office.• Serve as a Risk Management Specialist Analyst for the Risk Management Branch and other functional groups.• Provide Risk Management Framework (RMF) support to assigned DMDC/DHRA Information Systems; ensuring that System/Product Owners maintain an appropriate operational cybersecurity posture• Support Continuous Monitoring and Event-driven monitoring for Boundary/System Owner in all activities conducted to ensure controls remain effective over time, by monitoring control(s) assurance for the given systems’ Common and Inherited Controls and Reciprocity• STIGS: Utilize the assigned tool, such as eMASSTER to generate STIG results, and assigned actions for remediation for the Risk Management Branch and other functional groups. Other STIG tools may be applicable• POA&M• Develop and track compliance for new and existing POA&Ms for all ATOs.• Review POA&M status at the prescribed frequency, and engage staff members across the enterprise to ensure POA&M date are achieved on time and are documented in eMASS• Provide support for the ServiceNow ticket queues for cybersecurity Risk Management Branch• Documentation Compliance and Management• Provide security documentation management by ensuring document currency, and compliance status with NIST controls and CCIs• Support documentation maintenance for all required artifacts in eMASS.• Support the development of policies and procedures• As needed, conduct research and present findings to leadership, ISSOs, ISSMs, etc.• Provide support under ISSO and or senior leadership guidance that appropriate security controls and measures are in place to safeguard DHRA/DMDC systems, applications, networks, and data.• Provide support to Risk Management team across a spectrum of services.• Support the review the system as required, to identify and eliminate unnecessary functions, ports, protocols, and/or services• Assist the boundary owner(s) in the creation and or update of a compliant System Security Plan (SSP), as well as managing and controlling changes to the system and assessing the security impact of those changes• Provide support for the creation of presentations and or metrics as requested. Create weekly, and monthly reports, as neededSalary Range: $140,000

Average salary estimate

$140000 / YEARLY (est.)
min
max
$140000K
$140000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Information Security Analyst, ECS

ECS is on the lookout for a talented Information Security Analyst to join our dynamic team in Seaside, CA! In this role, you'll be at the forefront of safeguarding our digital assets and ensuring compliance with industry standards. Your day-to-day tasks will revolve around serving as a Risk Management Specialist Analyst, where you’ll collaborate with various functional groups to bolster our cybersecurity initiatives. With your expertise, you'll provide essential support for the Risk Management Framework (RMF) targeting our DMDC/DHRA Information Systems. Monitoring cybersecurity controls will be a key part of your responsibilities, as you ensure they remain effective over time. You will utilize tools like eMASSTER to generate STIG results while also being involved in the development and tracking of Plans of Action and Milestones (POA&Ms). As a part of our team, you'll ensure that documentation is up to date and compliant with NIST controls, contributing significantly to our overall security posture. Expect to conduct research and present your findings to our leadership and stakeholders. Your input on system security plans and metrics will be crucial as you navigate the diverse landscape of cybersecurity. With a competitive salary of $140,000, this position offers the opportunity to make a real impact while working in a vibrant office environment. Join us and be a key player in fortifying our information security efforts!

Frequently Asked Questions (FAQs) for Information Security Analyst Role at ECS
What are the responsibilities of the Information Security Analyst at ECS?

As an Information Security Analyst at ECS, your primary responsibilities will include serving as a Risk Management Specialist Analyst for the Risk Management Branch. You'll support the Risk Management Framework (RMF) for DMDC/DHRA Information Systems, ensuring effective monitoring and compliance of controls. This role involves managing the STIG results using tools like eMASSTER, tracking compliance for POA&Ms, and providing vital documentation management aligned with NIST controls. You'll work collaboratively across various teams to enhance our cybersecurity measures.

Join Rise to see the full answer
What qualifications are required for the Information Security Analyst position at ECS?

To excel as an Information Security Analyst at ECS, candidates should have a solid background in cybersecurity principles and practices, ideally supported by a degree in a related field. Familiarity with NIST standards, Risk Management Framework (RMF), and tools like eMASSTER is crucial. Strong analytical skills, attention to detail, and excellent communication abilities are also essential since you'll be presenting findings and collaborating with various stakeholders within the company.

Join Rise to see the full answer
How does ECS ensure continuous monitoring in cybersecurity?

ECS emphasizes continuous monitoring as a key aspect of its cybersecurity strategy. As an Information Security Analyst, you will be responsible for ensuring that appropriate monitoring tools and controls are in place. This includes regularly reviewing system configurations, managing event-driven monitoring, and ensuring that the cybersecurity posture of all systems remains robust and effective over time. Your role will involve real-time assessments and proactive engagement to identify and mitigate risks.

Join Rise to see the full answer
What tools does an Information Security Analyst use at ECS?

Information Security Analysts at ECS utilize a variety of tools essential for maintaining cybersecurity integrity. One key tool is eMASSTER, which is used for generating STIG results and managing compliance documentation. In addition, familiarity with tools for managing security incidents, tracking POA&Ms, and reviewing compliance statuses is important. You will also work with ServiceNow for ticket management related to cybersecurity inquiries and risks.

Join Rise to see the full answer
What does a typical day look like for an Information Security Analyst at ECS?

A typical day for an Information Security Analyst at ECS includes a mix of monitoring cybersecurity events, conducting assessments, and collaborating with different teams on compliance matters. You will spend time reviewing and updating security documentation, developing reports, and engaging with leadership to present research findings. Each day brings new challenges, from managing Security Plans to implementing controls and policies, making it a dynamic and engaging work environment.

Join Rise to see the full answer
Common Interview Questions for Information Security Analyst
How do you stay updated with the latest trends in cybersecurity?

To stay updated with the latest trends in cybersecurity, I regularly engage with professional forums, subscribe to industry publications, and attend webinars or conferences. I also participate in online courses and certifications to enhance my knowledge and skills continually. The cybersecurity landscape is ever-evolving, so staying informed is crucial for effectively protecting our systems.

Join Rise to see the full answer
Can you explain the Risk Management Framework (RMF) and its importance?

The Risk Management Framework (RMF) is essential for identifying and managing cybersecurity risks. It provides a structured approach to integrating security and risk management activities into the system development life cycle. By following the RMF, organizations can ensure that their information systems are secure and compliant, thus reducing vulnerabilities and enhancing overall security posture.

Join Rise to see the full answer
What is your experience with cybersecurity compliance documentation?

In my previous roles, I have been heavily involved in creating, managing, and maintaining cybersecurity compliance documentation. This includes developing System Security Plans (SSPs), monitoring compliance statuses, and ensuring that all documents are current according to NIST guidelines. I understand the importance of thorough documentation and its role in safeguarding our systems while meeting regulatory requirements.

Join Rise to see the full answer
Describe your process for conducting a security assessment.

My process for conducting a security assessment involves several key steps: first, I identify the scope and assets that require assessment. Next, I evaluate existing controls and documentation, followed by identifying potential vulnerabilities through testing and analysis. After gathering data, I compile findings into a report, which outlines the current security posture, suggests improvements, and prioritizes action items for remediation.

Join Rise to see the full answer
How do you manage multiple cybersecurity projects simultaneously?

Managing multiple cybersecurity projects simultaneously requires effective time management and organization. I prioritize tasks based on urgency and impact, keeping track of deadlines using project management tools. Regular communication with team members ensures alignment and progress, while scheduled check-ins help to address any issues promptly. I also allocate time for unforeseen challenges, allowing me to maintain project momentum.

Join Rise to see the full answer
What strategies do you use for effective risk communication?

For effective risk communication, I focus on clarity and context—ensuring that I articulate the potential risks and impacts in a way that resonates with both technical and non-technical stakeholders. Visual aids, like charts and graphs, can help convey complex information more intuitively. Additionally, I tailor my communication style to the audience, emphasizing actionable insights that guide decision-making.

Join Rise to see the full answer
How would you approach a vulnerability you discovered in a system?

Upon discovering a vulnerability in a system, my immediate approach would include assessing the severity and potential impact of the issue. I would document the findings and notify relevant stakeholders promptly. Depending on the organization's policies, I'd initiate a remediation process to mitigate the vulnerability while prioritizing preventive measures to ensure it doesn't recur. Continuous monitoring would follow to verify the effectiveness of any implemented changes.

Join Rise to see the full answer
What is your experience with security auditing?

I have substantial experience conducting security audits, where I assess compliance with established security policies and regulatory requirements. This involves reviewing security controls, analyzing documentation, and interviewing key personnel to verify adherence to processes. I also provide recommendations for improvement and ensuring that action items from audits are tracked and resolved promptly.

Join Rise to see the full answer
Why is continuous monitoring important in cybersecurity?

Continuous monitoring is vital in cybersecurity as it ensures that security controls remain effective and that any new threats are identified and addressed promptly. It provides real-time visibility into potential security risks and allows for immediate action when anomalies are detected. This proactive approach significantly enhances an organization's ability to respond to incidents before they escalate into serious issues.

Join Rise to see the full answer
How do you document and track Plans of Action and Milestones (POA&Ms)?

To document and track Plans of Action and Milestones (POA&Ms), I utilize project management software and compliance tools to ensure accurate record-keeping. Each plan is structured to include specific actions, responsible parties, and deadlines. I regularly review the status of each POA&M, engaging with team members to follow up on their progress, and I ensure that all updates are documented in the chosen tracking tool for transparency and accountability.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
ECS Remote Washington, DC
Posted 13 days ago
Photo of the Rise User
Cast & Crew Remote United States (Remote)
Posted 2 days ago
Inclusive & Diverse
Diversity of Opinions
Mission Driven
Collaboration over Competition
Medical Insurance
Dental Insurance
Vision Insurance
Paid Time-Off
Mental Health Resources
Photo of the Rise User
Posted 3 days ago
Photo of the Rise User
Posted 12 days ago
Photo of the Rise User
indie Semiconductor Remote Toronto, Canada; Austin, Texas; Edinburgh, UK
Posted 11 days ago
Posted 6 days ago
Photo of the Rise User
Posted 11 days ago

MEET THE CHALLENGE. MAKE A DIFFERENCE.

32 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 15, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!