Hunter Strategy

Assessment Data Analyst

Hunter Strategy

full-time

Posted on:

Location Type: Remote

Location: Remote • 🇺🇸 United States

Visit company website
AI Apply
Apply

Job Level

Junior

Tech Stack

Cyber SecuritySplunk

About the role

  • Support the aggregation and analysis of cybersecurity assessment data to evaluate organizational cybersecurity posture.
  • Monitor cybersecurity assessment data flows and recommend quality improvement initiatives.
  • Develop mappings between existing controls and assessment metrics.
  • Perform statistical analyses on large cybersecurity datasets, including calculating standard deviations, trends, and deviations.
  • Utilize various tools such as spreadsheets, databases, business intelligence platforms, visualization tools, or programming languages for data analysis (LLM or AI-assisted tools such as ChatGPT are not permitted).
  • Identify and map data flows within enterprise networks to support assessment and analysis activities.
  • Conduct event log analyses to determine telemetry, chain of events, impact, threats, and recovery or mitigation steps—leveraging Splunk as a key SIEM tool.
  • Use the MITRE ATT&CK Framework to support threat hunting and detection-building in Splunk (a plus).
  • Provide actionable insights and recommendations to improve cybersecurity posture based on data-driven findings.

Requirements

  • At least 1 year of experience performing statistical analysis on large cybersecurity datasets.
  • Demonstrated experience using analytic methods and tools to interpret complex data (without AI-assisted solutions).
  • Minimum of 2 years of experience conducting federal cybersecurity assessments measuring compliance with NIST 800-53 rev 4 or newer.
  • Minimum of 2 years of experience with FISMA compliance assessments.
  • Minimum of 2 years of experience in a customer-facing role with demonstrated ability to assess compliance, document findings, and provide actionable recommendations.
  • Experience identifying and mapping enterprise data flows.
  • Experience with event log analysis and SIEM tools such as Splunk.
  • Experience with the MITRE ATT&CK Framework (preferred).
  • Experience as a SOC Analyst using Splunk (preferred).
  • Active Public Trust Clearance and/or clearable for a Government Security Clearance.
Benefits
  • Health insurance
  • Retirement plans
  • Paid time off

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
statistical analysisdata analysisevent log analysiscybersecurity assessmentscompliance assessmentdata mappingthreat huntingdata visualizationNIST 800-53FISMA compliance
Soft skills
customer-facingactionable recommendationscommunicationanalytical thinkingproblem-solving
Certifications
Public Trust ClearanceGovernment Security Clearance
ManpowerGroup

Senior Workforce Data Analyst Consultant

ManpowerGroup
Seniorfull-time$40–$50🇺🇸 United States
Posted: 3 hours agoSource: manpowergroup.taleo.net
SQLTableau
Manpower

Senior Workforce Data Analyst Consultant

Manpower
Seniorfull-time$40–$50🇺🇸 United States
Posted: 3 hours agoSource: manpower.taleo.net
SQLTableau
Trafilea Tech E-commerce Group

Data Analyst

Trafilea Tech E-commerce Group
Mid · Seniorfull-time🇺🇸 United States
Posted: 8 hours agoSource: trafilea.recruitee.com
SQLTableau
Intersect

Energy Market Risk Data Analyst

Intersect
Junior · Midfull-time$105k–$119k / yearCalifornia, Colorado, New York, Texas · 🇺🇸 United States
Posted: 10 hours agoSource: jobs.lever.co
CloudETLPythonSDLCSQL