Find your dream job faster with JobLogr
AI-powered job search, resume help, and more.
Try for Free
QS

Quadtec Solutions, Inc

via ZipRecruiter

Apply Now
All our jobs are verified from trusted employers and sources. We connect to legitimate platforms only.

Cybersecurity Threat/Data Analyst w/Splunk (US Citizen)

Anywhere
full-time
Posted 10/3/2025
Verified Source
Key Skills:
Federal cybersecurity assessments
NIST 800-53 compliance
FISMA compliance
Splunk SIEM
MITRE ATT&CK Framework
Data mining
Event log analysis
Customer-facing compliance assessment

Compensation

Salary Range

$70K - 100K a year

Responsibilities

Support aggregation and analysis of cybersecurity assessment data to measure compliance and recommend improvements.

Requirements

At least 2 years of federal cybersecurity assessment experience including NIST 800-53 and FISMA compliance, customer-facing roles, and Splunk SIEM usage.

Full Description

The assessment data analyst is responsible for supporting the aggregation of individual assessments to measure the overall cybersecurity posture of business units. This analyst will monitor cybersecurity assessment data flows, recommend quality improvement initiatives, and develop a mapping between existing controls and judiciary assessment metrics. Candidates must meet or exceed the following qualifications: 1. Minimum of 2 years’ experience conducting federal cybersecurity assessments that measure compliance with controls from the National Institute for Standards (NIST) 800-53 rev 4 or newer control family. 2. Minimum of 2 years’ experience with federal assessments to include compliance with Federal Information Security Modernization Act (FISMA). 3. Minimum of 2 years’ experience in a customer-facing role with a demonstrated ability to assess compliance, document findings and provide recommendations for implementing the appropriate controls. • Experience in identifying and mapping the flow of data in an enterprise network is key. • Experience data mining large data sets • Experience in event log analysis to determine telemetry, chain of events transpired, impact, threat and if damage has resulted, along with identifying recovery or mitigation steps that need to be directed is a plus. Use of Splunk as a SIEM in this endeavor is key. • Use of the MITRE ATT&CK Framework to build detections in Splunk to hunt for or aid others in the hunt for adversary on the network and identifying them where they fall in the framework is a plus. • Experience as a SOC Analyst where the SIEM was Splunk is a plus. Company DescriptionIT Professional Services Firm focused on Information Communications Technologies - www.quadtec.com

This job posting was last updated on 10/9/2025

Ready to have AI work for you in your job search?

Sign-up for free and start using JobLogr today!

Get Started »
JobLogr badgeTinyLaunch BadgeJobLogr - AI Job Search Tools to Land Your Next Job Faster than Ever | Product Hunt