Cybersecurity Analyst, Endpoint Health and Security – University Information Services Georgetown University

2115 Wisconsin Ave 3rd Floor

Apply now Apply later

Located in a historic neighborhood in the nation's capital, Georgetown offers rigorous academic programs, a global perspective, exciting ways to take advantage of Washington, D.C., and a commitment to social justice. Our community is a tight knit group of remarkable individuals interested in intellectual inquiry and making a difference in the world.

Requirements

Cybersecurity Analyst, Endpoint Health and Security – University Information Services Georgetown University

Job Overview

The Cybersecurity Analyst, Endpoint Health and Security is an advanced, hands-on practitioner and representative of the cybersecurity operations team, performing a technical role that requires a solid understanding of information security and systems administration, as well as an understanding of business and governance process.

They are responsible for the benchmarking and compliance of institution endpoints, applying an understanding of applications, operating systems, networking, cloud infrastructure and basic attacker tactics, techniques and procedures (TTPs); and maintain a high level of rigor  stay up-to-date with advancements in technology, while also retaining knowledge of older systems and applications in use.

The Cybersecurity Analyst understands that legacy and present-day systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given that cyber endpoint health and security and risk exposure extend across all technical systems enterprise-wide, their responsibilities include identifying end-user assets and vulnerabilities, reporting, remediation and continuous assessment. They collaborate with others on the team for remediation and additional validation, as well as contribute to other collaborative approaches driven by the cybersecurity team strategy.

Work Interactions

Reporting directly to the Director of the Cybersecurity Operations Center, the Cybersecurity Analyst coordinates as directed with UIS divisions and stakeholders on matters related to cyber threats, risks, remediations, and preventive measures. They are involved in day-to-day cybersecurity operations, and coordinate work with various University technical staff, including cyber risk analysts, project managers and system owners.

Candidate  Qualifications

  • Capable of working with diverse teams and promoting an enterprise-wide positive security culture
  • Self-starter requiring minimal supervision
  • Outstanding written and verbal, business and cybersecurity communication skills
  • Highly organized and efficient, with strong project management, multitasking and organizational skills
  • Ability to preserve credibility with the team and external constituents through sustained industry knowledge
  • Ability to motivate teammates to achieve excellence and willingly shares knowledge
  • Ability to maintain a high level of integrity, trustworthiness and confidence, with the highest level of professionalism
  • Track record of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively
  • Ability to obtain and maintain technical team and business support to influence a collaborative effort to reduce attack surface

Position Requirements

  • Knowledge of one or more compliance standards, including Payment Card Industry (PCI), Health Information Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act (GLBA), National Institute of Standards (NIST) or International Standards Organization (ISO)
  • Scripting capability in Python, Bash, Perl or PowerShell
  • Ability to analyze incident logs, assess malware, and understand vulnerabilities and exploits, along with strong operating systems knowledge
  • Understanding of operating systems, endpoint applications, networking protocols and devices
  • Working knowledge of Windows OS, Mac OS, Linux and Unix OS
  • Working knowledge of Jamf Intune, SCCM, CIS Benchmarking, STIG
  • Demonstrated understanding and comprehension of a wide range of host cybersecurity solutions
  • Applicable knowledge of adversary tactics, techniques and procedures (TTPs), MITRE ATT&ACK framework, CVSS, open source intelligence (OSINT) and deception techniques
  • Demonstrated ability to investigate, handle and track incidents
  • Proficiency with SIEM, intrusion detection and prevention systems (IDS/IPS), threat intelligence platforms and security orchestration, and automation and response (SOAR) solutions to centralize and manage incident and remediation workflow

Experience

  • At least 3 to 5+ years’ experience in information security administration, vulnerability management or security operations
  • Proficiency with vulnerability management solutions such as Tenable/Nessus, Qualys, Tanium and open source
  • Experience stabilizing systems to run minimal application requirements, least privilege and additional host hardening
  • Experience conducting organization-wide vulnerability scanning and remediation processes
  • Familiarity in BYOD and semi-managed endpoint environment

Preferred experience

Some experience with vulnerability management across Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform (GCP) 

Work Mode: Telework. Please note that work mode designations are regularly reviewed in order to meet the evolving needs of the University. Such review may necessitate a change to a position’s mode of work designation. Complete details about Georgetown University’s mode of work designations for staff positions can be found on the Department of Human Resources Mode of Work Designation.

Pay Range:

The projected salary or hourly pay range for this position which represents the full range of anticipated compensation is:

$54,616.00 - $100,493.33

Compensation is determined by a number of factors including, but not limited to, the candidate’s individual qualifications, experience, education, skills, and certifications, as well as the University’s business needs and external factors.

Current Georgetown Employees:

If you currently work at Georgetown University, please exit this website and login to GMS (gms.georgetown.edu) using your Net ID and password. Then select the Career worklet on your GMS Home dashboard to view Jobs at Georgetown.

Submission Guidelines:

Please note that in order to be considered an applicant for any position at Georgetown University you must submit a resume for each position of interest for which you believe you are qualified. Documents are not kept on file for future positions.

Need Assistance:

If you are a qualified individual with a disability and need a reasonable accommodation for any part of the application and hiring process, please click here for more information, or contact the Office of Institutional Diversity, Equity, and Affirmative Action (IDEAA) at 202-687-4798 or ideaa@georgetown.edu.

Need some assistance with the application process? Please call 202-687-2500. For more information about the suite of benefits, professional development and community involvement opportunities that make up Georgetown's commitment to its employees, please visit the Georgetown Works website.

EEO Statement:

Georgetown University is an Equal Opportunity/Affirmative Action Employer fully dedicated to achieving a diverse faculty and staff.  All qualified applicants are encouraged to apply and will receive consideration for employment without regard to race, color, religion, national origin, age, sex (including pregnancy, gender identity and expression, and sexual orientation), disability status, protected veteran status, or any other characteristic protected by law.

Benefits:

Georgetown University offers a comprehensive and competitive benefit package that includes medical, dental, vision, disability and life insurance, retirement savings, tuition assistance, work-life balance benefits, employee discounts and an array of voluntary insurance options. You can learn more about benefits and eligibility on the Department of Human Resources website.

Apply now Apply later
  • Share this job via
  • or
Job stats:  8  2  0
Category: Analyst Jobs

Tags: Automation AWS Azure Bash C Cloud Compliance CVSS Exploits GCP GLBA Governance HIPAA IDS Intrusion detection IPS Jamf Linux Malware Nessus NIST Open Source OSINT Perl PowerShell Python Qualys Scripting SIEM SOAR Strategy Threat intelligence TTPs UNIX Vulnerabilities Vulnerability management Windows

Perks/benefits: Career development Competitive pay Equity / stock options Health care Insurance

Region: North America
Country: United States

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.