Job Purpose
The Data Privacy and Compliance Analyst is responsible for assessing business policies procedures and operations to ensure the organization meets privacy requirements and government regulations for the protection of sensitive information. Privacy and Compliance Analysts manage the legal and operational risks related to sensitive and critical information assets continuously assess business unit operations and develop policies procedures and user training necessary to meet or exceed privacy requirements.
Key Responsibilities
- Assists with difficult cybersecurity questions and requests from customers.
- Direct sponsor engagement as required to review current and planned requirements for secure infrastructures that require compliance.
- Guide requirements gathering and analysis.
- Leads validation of security control configuration on systems ensure all systems are configured to necessary controls such as NIST DFARS 252.CMMC and other similar requirements.
- Articulates privacy requirements into product lifecycle including definition requirements analysis synthesis cyber engineering analysis and implementation.
- Conducts privacy impact analyses and identify areas needing improvement and recommend necessary enhancements to achieve privacy goals.
- Reviews modifications to critical information systems and directs implementation of configuration changes.
- Mentors lowerlevel cybersecurity and IT professionals across the enterprise.
Additional Responsibilities
- Reviewing new vulnerabilities identified from threat analysis sources and identify and prioritize new high impact vulnerabilities.
- Identifying the impacted assets and/or application(s) at risk.
- Coordinate with different labs and business units in addressing plans of action and milestones.
- Calculate and respond to key performance indicators track mitigations to improve performance metrics.
- Monitor and track the progress of risk remediation activities. Collaborate with stakeholders to ensure timely and effective remediation of identified risks and issues while providing regular briefings to senior management on vulnerabilities and mitigation activities.
- Review and analyze vulnerability reports and liaison with business units to which they belong to track monitor for compliance and ensure closure.
- Perform as backup to the Vulnerability Manager when need to run scheduled or adhoc reports as well as compile reports and distribute communication related to new critical vulnerabilities.
- Assist in the analysis and remediation of findings discovered during scheduled internal and thirdparty vulnerability scans and penetration tests.
- Provide strategic direction to ensure alignment with the organizations overarching cybersecurity strategies and policies.
- Provide continuous improvement of the vulnerability management lifecycle.
Required Minimum Qualifications
- Experience in vulnerability management.
- Ability to obtain a secret security clearance.
- Practical knowledge of security applications and technologies as well as operating system platforms including Windows Mac Linux and Networking technologies.
- Previous experience with vulnerability scanning reporting and management processes or tools.
- Hands on knowledge of application and infrastructure vulnerability scanning tools (e.g. Rapid7 Nessus Qualys Fortify etc.) in complex or large organizations.
- Technical background to understand the characteristics and exploitation vectors for vulnerabilities being reported.
- Strong knowledge of Splunk Tenable Nessus APIs Excel and Power BI Platform for data analytics.
- Experience with advanced Excel data manipulation and analysis including pivot tables light macros intermediate formulas.
- Previous experience in analyzing data to present relevant metrics to remediation stakeholders and leadership.
- Sound knowledge of common infrastructure vulnerability categorizations such as CVE CVSS and/or CWE.
- Deep understanding of cybersecurity best practices and frameworks such as NIST 80053/171 CMMC RMF MITRE ATT&CK Framework and OWASP top 10.
- Risk management expertise with ability to translate technical risks for business leaders.
- Experience judging the priority of a vulnerability based on risk and impact.
- Excellent written and verbal communication skills.
- One or more basic cybersecurity certifications such as: Security CEH CND CySA CCNASecurity or equivalent.
Preferred Qualifications
- Active Secret clearance.
- 9 years of experience in vulnerability management
- Masters degree
- Experience leading or managing a Vulnerability Management program.
- One or more advanced cybersecurity certifications such as: CISSP CISM CISA CASP GEVA CCNPSecurity or equivalent.
Remote Work :
No