Required Skills

Cyber Security Analyst

Work Authorization

  • US Citizen

  • Green Card

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 20th Jan 2026

JOB DETAIL

Our Client seeks a local Cyber Security Analyst whose strength is in
firewalls with minimum 5 years' experience with at least 2 years in a
large-scale enterprise Windows environment. This position is fully remote;
however, the individual will need to come onsite to The Server Farm at the
manager's request.

Overview:
This candidate serves as a Cyber Security Analyst within the Information
Security Office of Pennsylvania's Infrastructure and Economic Development IT
Delivery Center (IED DC) which includes the Department of Transportation
(PennDOT), PA Emergency Management Agency (PEMA) and the Department of
Community and Economic Development (DCED).

Job Responsibilities:
* Demonstrates good judgement and problem-solving skills. Reacts and adapts
to changing circumstances rapidly. Technically proficient and experienced
with Windows and Unix/Linux operating systems, enterprise class firewalls,
network security, network traffic analysis, incident response, vulnerability
analysis, packet analysis, and systems hardening. Possesses proficient
knowledge of layer 2 switching and layer 3 routing protocols, encryption
protocols, communication protocols. Examples include but not limited to:
TLS/SSL, IPsec, SSH, PGP, VLAN, LLDP, LACP, ARP, 802.1x, DNS, AES, etc.

* Assists in deterring, identifying, monitoring, investigating and analyzing
network intrusions. Collects intrusion artifacts, indicators of compromise,
correlates artifacts across systems, and gathers other relevant facts to
enable mitigation of potential incidents within the enterprise.

* Receives and analyzes network alerts from various sources within the
enterprise. Determines the alert trigger, the severity of the alert, and
prioritizes response accordingly. Track and document incidents from initial
detection to final resolution.

* Participates in the containment and neutralization of cyber threats based
on the intelligence and indicators of compromise gathered. Assesses damage
to services, systems, networks, data and other relevant assets. Participates
in the restoration and reconstitution of systems and services. Makes
recommendations to prevent the recurrence of cyber incidents and verifies
that normal operations have resumed.

* Manages, monitors, and analyzes several security technologies to include
defensive and offensive security solutions on the perimeter and internal
networks such as firewalls, intrusion detection/prevention systems
(IDS/IPS), data loss prevention, etc.

* Uses data from Security Information and Event Management (SIEM) and other
logging solutions to conduct analysis, identify cyber trends, disseminate
relevant findings, and recommend suitable security and/or compensating
controls.

* Participates in the design and implementation of security controls. Grants
and revokes access to restricted resources, ensures that end-users are
authorized to access requested resources, and participates in periodic
system audits/cleanup initiatives.

* Assists leadership in planning and implementing cybersecurity
infrastructure or technology related projects, participates in the
installation of equipment, related cabling, and conducts ongoing
maintenance/repair of security infrastructure assets as needed.

* Performs research, evaluates security technologies/services, to drive
process improvements, integrate automation, increase efficiency, strengthen
service delivery, and improve security posture.

* Assists in maintaining an accurate and thorough knowledgebase. Creates and
revises documentation, procedures, flowcharts, diagrams, etc.

* Leverages Commonwealth incident tracking and ticketing systems to receive
tasks from other units, delegate tasks to other units, prioritize daily
tasks, document actions taken, and the final resolution for tasks completed.

* Provides on-call and/or emergency support, including after-hours as
needed.

* Adheres to established service management processes and procedures.

* Performs all other related duties as assigned.

Requirements:
* Professional cyber-security experience in large-scale Windows environments
- 5 years minimum.

* Understanding of current threats and trends in information security.

* Professional oral and written communication skills.

* Excellent soft skills such as listening, presenting, and negotiating.

* Must pass required Pennsylvania State Police background check (cannot have
any felony offenses)

* Ability to work remotely.

Desired:
* Active cyber-security certification from an accredited organization such
as ISC2, CISA, CompTIA, EC-Council, ISACA, GSEC, etc.



Skill

Required / Desired

Amount

of Experience


Minimum 5 years' professional cyber-security experience w/at least 2 years
in a large-scale enterprise Windows environment

Required

5




Understanding of current threats and trends in information security

Required

Any




Professional oral and written communication skills

Required

Any




Excellent soft skills such as listening, presenting, and negotiating

Required

Any




Must pass required Pennsylvania State Police background check (cannot have
any felony offenses).

Required

Any




Desired Certifications (1 or more)- ISC2, CISA, CompTIA, EC-Council, ISACA,
GSEC (or other relevant cert(s) such as CISSP, GSEC, GCIH, GCFA, CISM)

Desired

Any




Experience with Firewalls: AlgoSec, Checkpoint, CISCO ASA, SilverPeak,
VMWare NSX

Desired

Any




Experience with scripting languages - PowerShell, Python, etc.

Nice to have

Any




Experience with forensic tools, such as Network security monitoring: FireEye
NX, AX, PX Endpoint, Splunk - ES

Nice to have

Any




Experience with Web vulnerability scanning: Tenable.IO, Rapid7 AppSpider

Nice to have

Any




Experience with Encryption: Globalscape Secure FTP, PGP

Nice to have

Any




Experience with Penetration testing: Metasploit, Kali Linux, Netsparker, and
Wireshark

Nice to have

Any




Experience with Network intrusion detection tools such as Snort, Security
Onion, SolarWinds Security Event Manager

Nice to have

Any




Experience with Packet sniffers such as Tcpdump and Windump

Nice to have

Any




Familiarity with SAST and DAST tools such as Veracode, AppSpider and AppScan

Nice to have

Any

Company Information