There are still lots of open positions. Let's find the one that's right for you.
Excentium, Inc. is a Service-Disabled Veteran owned small business that provides Cyber Security Engineering, Information Assurance (IA), management, Certification and Accreditation (C&A), and other IT services to government and commercial organizations. We have an opportunity for a Cybersecurity Analyst Expert supporting the Department of Veterans Affairs. This position is remote and requires a minimum clearance level of Public Trust. The Cybersecurity Analyst will be responsible for reviewing the design, implementation, monitoring, and maintenance of an organization's data and information. The role involves providing support for task requirements related to Cybersecurity Engineering Support, Cybersecurity Network Domain Certification, Accreditation Support, and Cross Domain Solution (CDS) Assessment and Authorization (A&A) Support. The Cybersecurity Analyst will also perform Cyber Security Operational duties to ensure the appropriate ongoing operations of systems, processes, and policies within the Cyber Security Team. This includes managing operational changes in support of projects, initiatives, and operations to ensure effective and efficient operations. The analyst will ensure the ongoing efficient and effective operations of the assigned systems, processes, and procedures to fully meet the control objectives. Additionally, the role requires analyzing system and network information and developing defense measures to eliminate or reduce the effects of cybersecurity threats. The ideal candidate will possess expertise in IT with a focus on Cyber Security Policy and threat mitigation. They should have demonstrated knowledge and use of Cyber Security tools, network topologies, intrusion detection, Public Key Infrastructure (PKI), and secured networks. The candidate should also be well-versed in developing long-term strategies and knowledgeable about various cyber threats and their mitigation. Extensive working knowledge of NIST and Federal information system security guidance, processes, and methodologies is essential for this role.