Firmenlogo

Cyber Risk Analyst presso Delan Associates, Inc

Delan Associates, Inc · Lemont, Stati Uniti d'America · Remote

Candidarsi ora

Title: Cyber Risk Analyst

W-2 Only (no 1099)

Must be a U.S. Citizen

Company’s Location: Lemont, IL

Job Description

Background:
The Companys Cyber Security Program Office promotes the safe and secure use of information technology. There are a variety of risks and threats inside and outside of the Laboratory.

Company’s Cyber Security Program Office (CSPO) safeguards the Laboratory by identifying, protecting against, detecting, responding to, and recovering from cybersecurity risks and incidents. Services include consultation and guidance; detection and protection technologies; education and awareness; incident management; vulnerability management; and risk assessment and compliance.

Contract Position: Full Time, 40 hour work week

Period of Performance: 1 Year

Scope:
The Cyber Risk Analyst will play an important role in identifying and communicating areas of concern and risks to the business. This engagement will free up other cybersecurity resources to work in other critical Argonne areas. The ideal candidate will need to:
Possess a working level expertise with the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and the NIST 800-53 series of control families and approaches.

  • Perform detailed analysis and a cyber risk assessment of Cloud Service Providers (CSPs).
  • Engage with vendors to review controls, certifications, and risks in support of the associated business need and the laboratory's risk tolerance.
  • Partner with the CSPO in the development of risk assessment and reporting processes within the Laboratory's Governance, Risk and Compliance (GRC) tool, Talatek TiGRIS.
  • Partner with others from within the CSPO team and Laboratory IT environment to perform risk-based assessments of NIST 800-53 control validation and gap analysis.
  • Collaborate with the CSPO to present outcomes of risk analysis work using presentation methods to CSPO and other lab audiences (IT admins, Deputy CIO, CISO)
  • Maintain assessment and assessment results in identified repositories, e.g., the Lab's GRC tool, Talatek TiGRIS, MS Excel, Box or Box
  • Assist in the performance of the laboratory's Divisional Site Assist Visit (DSAV) self-assessment and continuous monitoring strategy, assessing the cyber security controls and their implementation in various programmatic spaces.

Objectives

The ideal candidate will have:

  • A fundamental understanding of IT Risk management and the NIST 800 series framework.
  • Experience with government environments.
  • Experience working closely with cyber security leadership and peers along with IT system/process owners to capture artifacts for control testing.
  • Technical understanding of systems and technologies to inform audits and assessments.
  • Ability to translate results into business-oriented, task-focused presentations.
  • The ideal candidate will support the projects and tasks associated with Cybersecurity Risk Assessment and Compliance.
  • Ability to support urgency and timeliness expectations, assuring risk assessments are completed to support DOE Authority to Operate and Authority to Use deadlines.
    • Typically, the assessment presentation cadence is weekly for the DOE's Company Site Office, and monthly for the DOE Authorizing Official.

Qualifications:

  • Considerable knowledge of Risk Management and Risk Management Framework (RMF) requirements
  • Working level knowledge of the NIST 800 Rev 5 series framework
  • Considerable knowledge/experience of assessing controls.
  • Knowledge of industry-standard and organizationally accepted analysis principles and methods.
  • Experience in working with Governance Risk Compliance systems.
  • Experience presenting reports and outcomes to leadership, tracking to closure, and creating buy-in to risk management.
  • Experience and skill in conducting audits or reviews of technical systems.
  • Experience assessing vendor risk.
  • Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.
  • Ability to skillfully communicate through various methods. This includes written documentation. The audience will be leaders and executives. Finalists may be asked to complete a brief, job-relevant writing exercise.
  • Ability to work autonomously as a contributing member of a small technical team
  • Experience working in a government environment.
  • Experience working in a distributed IT environment.
  • Basic knowledge of cyber security concepts.
  • Working knowledge of networking administration.
  • Working knowledge of system administration.
  • Ability to qualify for HSPD-12 card for use in two-factor authentication.
  • Able to effectively interact with user organizations to validate controls.
  • Able to effectively disseminate knowledge to current staff.


Technical Direction of Work
Report to a senior staff Cyber Risk Analyst within Business & Information Services; including daily guidance and collaboration with others in the Cyber Security Program Office (CSPO).

REMOTE:
Typically, the work is performed remotely. For the candidate within driving distance of the Lab, there may be rare times to be onsite for in-person meetings, assessments, or presentations. Most of the Business Information Services (BIS) Division works remotely and are rarely onsite. If the candidate is out of state, too far away from the Lab, onsite meetings are not feasible to attend and not required.

The following expectations are part of working remote:

  1. Working remotely outside of scheduled times requires supervisor approval prior to performing that remote work.
  2. While working remotely, just like when onsite, all scheduled meetings must be attended (using approved remote communication tools).
  3. The candidate must be available for consultation during all scheduled work time, reachable by email, phone, chat, or other approved means.
  4. Performance will be monitored to determine productivity for remote work at least matches that when onsite. If performance and deliverables decline, remote work may be suspended.
  5. Should a situation arise that requires the candidate to be onsite while scheduled to work remotely, accommodation will be made to reschedule the remote work, if desired.
  6. The remote work privilege may be revoked at any time at the discretion of company.
  7. A flexible work schedule may also be possible if the schedule is agreed to by the candidate and approved by the supervisor and sponsor.
  8. Should the laboratory close operations due to weather or other circumstances, remote work is preferred.
  9. The candidate must track their remote work schedule into the CSPO absence calendar and be approved by CSPO supervisor.


Expectation/Deliverables:

  • Assist in the management of Lab-Vendor risk assessments throughout the engagement.
    • Includes analysis and a cyber risk assessment of Cloud Service Providers (CSPs) (Vendors).
  • Regularly, engage with vendors to review controls, certifications, and risks.
  • Regularly, engage with ANL System Business Owners to review controls, convey/educate regarding identified risks, and coordinate various control implementation with BIS technicians when necessary.
  • As necessary, work various Governance, Risk and Compliance (GRC) projects using GRC tool, Talatek TiGRIS.
    • Includes various risk-based assessments of NIST 800-53 Rev 5 control validation and gap analysis.
  • Present outcomes of risk analysis work to CSPO and other lab audiences, as needed.
  • Perform assessment and assessment result maintenance in the GRC tool, /Talatek TiGRIS, as necessary.
  • Deliverables include assessment process documents and assessment report management, updates in Talatek TiGRIS, and communicating via E-Mail, TEAMS, etc.


Computer Protection Program
Contractors shall comply with Company Computer Protection Program and Cyber Security Program requirements by:

  • Completing required training and understanding the protection requirements for any systems, applications, or sensitive data they access.
  • Adhering to all applicable policies and procedures and not bypassing any controls protecting data, applications, hardware, or communications.
  • Maintaining a work environment that meets audit, privacy, and security standards.
  • Immediately reporting any suspected or actual deficiencies in protection procedures to their technical contact, the BIS Computer Protection Program Representative.


Government-Furnished Property
Company will supply a government-furnished laptop, PIV Card, and PIV Card reader.

Place of performance
Work will be performed remotely, using communication through Microsoft tools such as Microsoft Teams and Microsoft Outlook

Period of Performance

Work would begin in October 2025, for 40 hours per week for 1 year.

Candidarsi ora

Altri lavori