
Assessment Data Analyst
Hunter Strategy
full-time
Posted on:
Location Type: Remote
Location: Remote • 🇺🇸 United States
Visit company websiteJob Level
Junior
Tech Stack
Cyber SecuritySplunk
About the role
- Support the aggregation and analysis of cybersecurity assessment data to evaluate organizational cybersecurity posture.
- Monitor cybersecurity assessment data flows and recommend quality improvement initiatives.
- Develop mappings between existing controls and assessment metrics.
- Perform statistical analyses on large cybersecurity datasets, including calculating standard deviations, trends, and deviations.
- Utilize various tools such as spreadsheets, databases, business intelligence platforms, visualization tools, or programming languages for data analysis (LLM or AI-assisted tools such as ChatGPT are not permitted).
- Identify and map data flows within enterprise networks to support assessment and analysis activities.
- Conduct event log analyses to determine telemetry, chain of events, impact, threats, and recovery or mitigation steps—leveraging Splunk as a key SIEM tool.
- Use the MITRE ATT&CK Framework to support threat hunting and detection-building in Splunk (a plus).
- Provide actionable insights and recommendations to improve cybersecurity posture based on data-driven findings.
Requirements
- At least 1 year of experience performing statistical analysis on large cybersecurity datasets.
- Demonstrated experience using analytic methods and tools to interpret complex data (without AI-assisted solutions).
- Minimum of 2 years of experience conducting federal cybersecurity assessments measuring compliance with NIST 800-53 rev 4 or newer.
- Minimum of 2 years of experience with FISMA compliance assessments.
- Minimum of 2 years of experience in a customer-facing role with demonstrated ability to assess compliance, document findings, and provide actionable recommendations.
- Experience identifying and mapping enterprise data flows.
- Experience with event log analysis and SIEM tools such as Splunk.
- Experience with the MITRE ATT&CK Framework (preferred).
- Experience as a SOC Analyst using Splunk (preferred).
- Active Public Trust Clearance and/or clearable for a Government Security Clearance.
Benefits
- Health insurance
- Retirement plans
- Paid time off
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
statistical analysisdata analysisevent log analysiscybersecurity assessmentscompliance assessmentdata mappingthreat huntingdata visualizationNIST 800-53FISMA compliance
Soft skills
customer-facingactionable recommendationscommunicationanalytical thinkingproblem-solving
Certifications
Public Trust ClearanceGovernment Security Clearance