Flag job

Report

Cybersecurity Analyst

Min Experience

5 years

Location

Tampa, Florida, United States

JobType

full-time

About the job

Info This job is sourced from a job board

About the role

Description

The Opportunity 
NTS is seeking a Cybersecurity Analyst to provide network and systems security engineering, security tests and evaluations, and risk assessments for NAVCENT IT systems, including risk management, vulnerability assessments, security assessments, and monitoring solutions. 

 

Key Responsibilities (Principal Duties and Accountabilities *Essential Functions)

  • Assist with IA programs and policies for the NAVCENT customer to include: 
  • Assist the Information System Security Manager (ISSM) with the execution and management of the command’s information assurance (IA) program within NAVCENT and its subordinate commands and detachments. The Contractor shall assist with the management of the NAVCENT IA program to include architecture, requirements, objectives, and policies. 
  • Investigate incidents and respond quickly to events; 
  • Provide on-call support for cybersecurity incidents and emergencies as needed. 
  • Assist with the development of best practices for NAVCENTs information security program; 
  • Review existing security policies and procedures, whether formal or informal; 
  • Work closely with the ISSM and staff to develop formal policies and procedures to facilitate the protection of U.S. Government sensitive unclassified and classified information and the security of various information systems and networks, e.g., NAVCENT MOC systems and Combined Enterprise Regional Information Exchange System (CENTRIXS); 
  • Review existing policies, procedures and guidelines and shall draft appropriate policy documents for implementations required by the ISSM. Assist appropriate government personnel in determining Cybersecurity and IA requirements, aid in the development of policies and procedures for implementation and provide support in implementing these mechanisms and processes to ensure that the policies can be enforced. This includes: Information Assurance Vulnerability Management (IAVM), IA awareness training, systems administrators’ certification, cybersecurity workforce compliance, and all other activities that contribute to the successful implementation of the full range of IA policies, procedures, and guidelines. 
  • Assist with Certification and Accreditation (C&A) for the NAVCENT customer to include: 
  • Assist in the development of System Security Accreditation Agreement (SSAA) documentation in accordance with the Risk Management Framework (RMF) guidelines; 
  • Support performing risk assessments on systems and networks and articulate findings in a format approved by the Government; 
  • Review System Security Authorization Agreements (SSAA); and assemble feedback from Certification Agents (CA) and other vulnerability assessments that are used to evaluate risk; 
  • Assist in preparing C&A documentation for submission to the Designated Approving Authority (DAA); 
  • Assist systems administrators in implementing corrective actions required as a result of vulnerabilities uncovered during system security reviews; 
  • Maintain the C&A package repository, develop and maintain the C&A accreditation status tracking database used to record the present status of all accreditation packages as well as store/archive information on accreditation already received and systems that have since been inactivated; 
  • Perform other C&A duties as assigned 
  • Assist with Compliance for the NAVCENT customer to include: 
  • Assist with development and implementation of the Government’s Cybersecurity compliance programs; 
  • Incorporate all facets of a Command Cyber Readiness Inspection (CCRI) process to include components, processes and data submission requirements that make up the CCRI into the compliance program; 
  • Inspect subordinate commands and provide a technical evaluation of their compliance program; 
  • Prioritize actions to correct compliance findings in order of severity and available resources; 
  • Provide status briefs and compliance reports to the ISSM as required by the Government; 
  • Monitor and evaluate vulnerability scans for all of the Government’s assets and information systems; 
  • Ensure the uploading of findings into the appropriate vulnerability database for analyses; 
  • Track all Category (CAT) I, II, and III findings until corrected, mitigated, or a Plan of Action & Milestone (POA&M) is established; 
  • Ensure new installations or hardware updates have incorporated the use of the Security Technical Implementation Guides (STIG) as part of the system change 
  • Assist the ISSM in interpreting DOD/DON policy and shall have experience in applying STIGs on all Navy systems; 
  • Assist with Auditing for the NAVCENT customer to include: 
  • Conduct and coordinate vulnerability and reporting to ensure vulnerability patches, risk assessments and protections policies are implemented/enforced throughout the
  • Government’s IT portfolio;
  • Carry out threat analysis;
  • Monitor network traffic for security incidents and events; 
  • Write detailed incident response reports; 
  • Fix system vulnerabilities; 
  • Perform real-time cybersecurity monitoring, detection, and incident response across government networks and systems. 
  • Provide cyber threat intelligence analysis and briefings to senior leadership. 
  • Configure, manage, and monitor cybersecurity tools and systems such as SIEMs, IDS/IPS, endpoint protection platforms, and firewalls. 
  • Collaborate with cross-functional teams (network engineers, system admins, intel analysts) to ensure an integrated defense-in-depth strategy. 
  • Provide guidance to correct or mitigate vulnerabilities as well as perform risk assessments on systems and networks and articulate findings in a format approved by the Government. 
  • Support, as needed, additional hours in the event of an incident/anomaly or changing requirements that mandate such support (e.g., inspections and real-world anomalies)

Requirements

  • Fluency in English (written and spoken)
  • US Citizenship with Active DoD clearance before arrival at NSA Bahrain or other assigned work location
  • Meet the most recent version of DOD 8570 for IAT II  

 

Education and Certifications

  • Bachelor's Degree (preferred but not required).
  • CompTIA Security + CE or any DOD 8570 IAT II equivalent certification.

 

Required Skills, Experience & Abilities 

  • 5 years or more of cyber analyst experience.
  • Abilities that can be demonstrated:
  • Ability to clearly document incidents, findings, and mitigation steps. 
  • Ability to brief technical and non-technical stakeholders on security issues. 
  • Ability to collaborate with cross-functional teams (network, system admins, leadership).

 

Technical Skills: 

  • Ability to detect, triage, and respond to cyber incidents in real time.
  • Ability to conduct network traffic analysis.  
  • Ability to identify vulnerabilities and recommend remediation using tools such as Nessus. 
  • Ability to apply security controls and hardening techniques across systems and networks.


Preferred Qualifications

  • Strong problem-solving and critical thinking skills
  • Professionalism and positive attitude in workplace interactions
  • Initiative and ability to take ownership of tasks/projects
  • Comfort with ambiguity and learning on the job
  • Strong work ethic and reliability
  • Ability to work well independently or as part of a team
  • Willingness to learn new tools or procedures 
  • Positive attitude toward safety and following protocols
  • Problem-solving and troubleshooting mindset
  • Ability to prioritize and manage multiple security incidents simultaneously 
  • Effective written and verbal communication skills (for reporting and briefings) 
  • Ability to work under pressure during high-tempo cyber incidents
  • Hands-on experience with incident response or vulnerability management

 

Physical Demands & Work Environment 
The physical demands and work environment described are representative of those that an employee encounters while performing the essential functions of this job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.

  • Prolonged periods of sitting at a desk and working on a computer.
  • Ability to lift up to 50 lbs. and work in austere field conditions.
  • Ability to lift up to 15 pounds on occasion (e.g., transporting laptop, presentation materials, or small equipment).
  • Frequent use of hands and fingers for typing, writing, and handling documents.
  • Clear vision and hearing required for meetings, presentations, and communication.
  • Ability to travel domestically and internationally up to 20% of the time, which may include extended periods of standing, walking, or navigating airports and government facilities.
  • Ability to sit or stand for long periods of time
  • Ability to withstand abnormal environmental conditions
  • Working in server rooms or data centers (cool environments, noise from equipment) 
  • Extended or irregular hours during incident response (including nights or weekends) 
  • Travel to alternate work sites or secure locations (depending on role)
  • The noise level in the work environment is usually moderate.
  • Professional office environment with standard office equipment (computers, phones, printers).
  • Frequent interaction with clients, executives, and government officials in both in-person and virtual settings.
  • Regular travel to customer sites, government facilities, and industry events.
  • Fast-paced, deadline-driven environment requiring adaptability and responsiveness.
  • Work may occasionally be performed in secure government facilities, requiring adherence to security protocols.This position may involve travel to government test sites, training ranges, and operational locations, including potential OCONUS destinations for short periods of time. 
  • Work may be conducted in laboratory, workshop, office, and field environments with varying conditions.
  • Occasional work in server rooms or network spaces. 
  • Exposure to cooler temperatures and constant background noise from equipment. 
  • Hands-on interaction with hardware (servers, switches, racks) when needed.
  • Office or secure facility with controlled access (e.g., badge or clearance-required areas).

Summary

Summary (optional)
TDY detail 08:00-16:00 core working hours, occasional travel to countries in the CENTCOM AOR.

 

Exciting opportunities like this are better when shared. Send this role to someone you know: Cybersecurity Analyst 

 

Equal Opportunity
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. NTS will also consider qualified applicants with criminal histories consistent with relevant laws for employment.
For individuals with disabilities that need additional assistance at any point in the application and interview process, please email recruiting@nextechsol.com

 

About the company

Provides systems integration and IT services for government agencies.

Skills

SIEM
IDS/IPS
Nessus
firewalls
endpoint protection