More jobs:
Information Security Analyst CrowdStrike; EDR), Splunk; SIEM), Tenable- Atlanta, GA/Hybrid
Job in
Atlanta, Fulton County, Georgia, 30383, USA
Listed on 2026-02-12
Listing for:
STI
Full Time
position Listed on 2026-02-12
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, Security Manager
Job Description & How to Apply Below
Information Security Analyst [Crowd Strike (EDR), Splunk (SIEM), and Tenable (Vulnerability Management)]
47 Trinity Ave SW Atlanta, GA / Hybrid
8+ months
This role is responsible for monitoring, detecting, analyzing, and responding to security events, managing vulnerabilities, and ensuring compliance with federal, agency, and organizational security requirements (NIST, FISMA, IRS Pub 1075, CMS, SSA). The analyst will also support audit readiness, maintain the System Security Plan (SSP), and lead targeted security awareness initiatives.
Key Responsibilities Security Operations & Monitoring- Conduct continuous monitoring of enterprise systems using Crowd Strike (EDR), Splunk (SIEM), and Tenable (Vulnerability Management).
- Detect, investigate, and respond to potential threats and incidents impacting CUI and overall system security.
- Maintain dashboards, alerts, and reports to ensure proactive detection and escalation of risks.
- Perform ongoing vulnerability assessments with Tenable, track remediation efforts, and validate closure of findings.
- Support patch management and configuration management processes to reduce the attack surface.
- Deliver metrics and risk posture updates to leadership.
- Maintain and update System Security Plans (SSPs) to document the implementation of security controls.
- Support external and internal audits (IRS, CMS, SSA, NIST, FISMA) by providing required evidence, documentation, and remediation tracking.
- Assist in compliance with evolving frameworks (e.g., NIST SP 800-53 Rev.
5).
- Triage, analyze, and document security incidents across enterprise systems.
- Coordinate with IT and business stakeholders on containment, eradication, and recovery efforts.
- Deliver incident reports, root cause analysis, and lessons learned documentation.
- Develop and deliver security awareness programs, emphasizing CUI handling, phishing defense, and insider threat mitigation.
- Conduct specialized training for privileged users and administrators.
- Track participation and report effectiveness of awareness initiatives.
- Provide leadership with actionable insights through Splunk dashboards, Tenable vulnerability reports, and Crowd Strike incident summaries.
- Deliver executive-level updates highlighting risks, compliance status, and incident trends.
- Track remediation activities and ensure timely closure of findings.
- Bachelor’s degree in information security, Cybersecurity, IT, or related field; or equivalent 1 year; or Preference will be given to candidates with relevant State of Georgia Experience.
- Hands‑on experience with Splunk, Crowd Strike Falcon, and Tenable Nessus/Tenable.sc.
- Strong understanding of CUI protection requirements and compliance frameworks (NIST, FISMA, IRS Pub 1075, CMS, SSA).
- Experience with incident response, vulnerability management, and risk assessments.
- Strong analytical, documentation, and communication skills.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×