Ashburn Consulting Logo

Ashburn Consulting

IT Security and Compliance Analyst

Sorry, this job was removed at 12:24 a.m. (MST) on Friday, May 02, 2025
Remote
Hiring Remotely in Washington, DC
Remote
Hiring Remotely in Washington, DC

Company Description

Ashburn Consulting, a Small Business based in the Washington, DC metropolitan area, specializes in providing network and network security solutions in complex environments to a select set of government and business clients. The company, an established leader in its field, is composed of an elite team of engineers and business consultants, each of whom is recognized —and highly regarded—within the network and security communities.

Job Description

We are seeking a highly motivated Security Compliance Analyst to oversee the development, implementation, and maintenance of security policies and procedures to ensure compliance with industry standards and regulations. This role will involve conducting regular security assessments, responding to security incidents, monitoring security technologies, and ensuring the organization remains in compliance with frameworks such as NIST 800-53. The ideal candidate will have strong expertise in cybersecurity principles, vulnerability management, and security technologies. 

Key Responsibilities: 

  • Incident Reporting: Immediately report any security incidents to the Information Systems Security Officer (ISSO) and IT Service Group (ITSG) leadership. Ensure timely and accurate documentation of all incidents for future analysis and reporting. 

  • Policy and Procedure Development: Develop, implement, and maintain the organization's information security policies, procedures, and standards to ensure robust protection of sensitive data and compliance with relevant regulations. 

  • Security Assessments: Conduct regular security assessments, vulnerability scans, and risk assessments to identify and mitigate potential security risks across systems, applications, and networks. 

  • Monitoring Security Technologies: Monitor and manage security technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus solutions, and encryption mechanisms to detect and respond to threats in real-time. 

  • Security Control Audits: Perform regular audits of security controls for access management, identity and authentication systems, and data protection mechanisms to ensure compliance with security policies and standards. 

  • Incident Response: Respond to and investigate security incidents, coordinating with incident response teams when necessary. Conduct root cause analysis to understand the source of incidents and implement corrective actions. 

  • Compliance and Regulatory Adherence: Ensure compliance with all relevant regulations, standards, and frameworks (e.g., NIST 800-53, FISMA, HIPAA, etc.). Work with other teams to achieve and maintain security certifications and assessments. 

  • Security Awareness Training: Provide security awareness training to end-users, including conducting periodic drills to ensure readiness in the event of a security breach or threat. 

  • Emerging Threats and Technologies: Stay updated on emerging cybersecurity threats, vulnerabilities, technologies, and best practices. Recommend and implement new security measures and tools as necessary. 

  • Documentation: Document all security configurations, incident responses, risk assessments, and compliance status reports for internal and external auditing purposes. Ensure records are up-to-date and easily accessible. 

  • Vulnerability Scanning and Reporting: Regularly scan for vulnerabilities and exploits within the organization’s systems, reporting findings to NOAA Cybersecurity and coordinating the response to identified issues. 

Qualifications

Required Skills & Qualifications: 

  • Relevant Certifications: Industry-recognized certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), CompTIA Security+, or equivalent certifications are required. 

  • Cybersecurity Knowledge: In-depth knowledge of cybersecurity principles, practices, and technologies. Familiarity with various cybersecurity tools and solutions (e.g., firewalls, IDS/IPS, encryption). 

  • Security Technologies Expertise: Experience with security technologies, including firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), antivirus software, and encryption protocols. 

  • Access Control and Data Protection: Strong understanding of access control technologies, identity management systems, and data protection methods to ensure security of sensitive information. 

  • Security Risk Management: Proven ability to perform security assessments, vulnerability scans, and risk assessments to identify security weaknesses and implement remediation actions. 

  • Compliance and Regulatory Adherence: Ensure compliance with all relevant regulations, standards, and frameworks (e.g., NIST 800-53, FISMA, HIPAA, etc.). Work with IT operations teams and system administrators to review, implement, and revise processes, procedures, and system configurations to achieve and maintain system security and compliance. 

  • Security Technologies Expertise: Experience with the implementation, purpose and user of security technologies, including firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), antivirus software, and encryption protocols in an enterprise IT environment. 

  • Experience with Virtual Environments: Hands-on experience managing and securing virtualized IT systems and ensuring their compliance with secure configuration standards such as STIGs. 

Preferred Qualifications: 

  • Advanced Certifications: Additional certifications such as Certified Ethical Hacker (CEH), CompTIA Cybersecurity Analyst (CySA+), or other advanced certifications are a plus. 

  • Experience with Security Tools: Familiarity with security information and event management (SIEM) tools and security orchestration and automation platforms. 

  • Cloud Security Knowledge: Experience securing cloud environments (AWS, Azure, etc.) and understanding cloud-specific risks and controls. 

  • Experience with Virtual Environments: Hands-on experience configuring and securing virtual machines (VMs) and ensuring their compliance with security standards such as STIGs. 

 

  1. In-depth knowledge of cybersecurity principles, practices, and technologies.  

  1. Strong knowledge of IT compliance frameworks such as NIST 800-53, FISMA, etc. 

  1. Experience conducting or supporting security assessments 

 

Additional Information

Equal Opportunity Employer/Veterans/Disabled. An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status

Ashburn Consulting is an Equal Opportunity Affirmative Action Employer.
In compliance with the American with Disabilities Act Amendments Act (ADAAA), if you have a disability and would like to request and accommodation in order to apply for a position with Ashburn Consulting, please e-mail [email protected].”

 

Similar Jobs

An Hour Ago
Easy Apply
Remote
United States
Easy Apply
Internship
Internship
Beauty • Robotics • Design • Appliances • Manufacturing
As an SQA Engineering Co-op, you will review product requirements, write automated test scripts, and support manual testing in a lab environment.
Top Skills: JavaLinuxNode.jsPythonRest Apis
2 Hours Ago
Easy Apply
Remote
31 Locations
Easy Apply
Senior level
Senior level
Cloud • Security • Software • Cybersecurity • Automation
The Principal Engineer, Analytics leads technical direction for analytics initiatives, mentors teams, conducts high-complexity problem-solving, and engages with stakeholders to optimize performance and scalability.
Top Skills: Ci/CdClickhouseGoKafkaNatsPostgresRuby On Rails
2 Hours Ago
Remote
8 Locations
Mid level
Mid level
Blockchain • Internet of Things • Payments • Cryptocurrency • Web3
As a Software Engineer, you will automate node deployments, enhance platform scalability and security while collaborating with different teams to integrate products seamlessly.
Top Skills: BlockchainGoSolidityTypescriptWeb3

What you need to know about the Colorado Tech Scene

With a business-friendly climate and research universities like CU Boulder and Colorado State, Colorado has made a name for itself as a startup ecosystem. The state boasts a skilled workforce and high quality of life thanks to its affordable housing, vibrant cultural scene and unparalleled opportunities for outdoor recreation. Colorado is also home to the National Renewable Energy Laboratory, helping cement its status as a hub for renewable energy innovation.

Key Facts About Colorado Tech

  • Number of Tech Workers: 260,000; 8.5% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Lockheed Martin, Century Link, Comcast, BAE Systems, Level 3
  • Key Industries: Software, artificial intelligence, aerospace, e-commerce, fintech, healthtech
  • Funding Landscape: $4.9 billion in VC funding in 2024 (Pitchbook)
  • Notable Investors: Access Venture Partners, Ridgeline Ventures, Techstars, Blackhorn Ventures
  • Research Centers and Universities: Colorado School of Mines, University of Colorado Boulder, University of Denver, Colorado State University, Mesa Laboratory, Space Science Institute, National Center for Atmospheric Research, National Renewable Energy Laboratory, Gottlieb Institute

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account