Data Analyst

Sorry, this job was removed at 06:16 p.m. (CST) on Wednesday, Aug 21, 2024
Quantico, VA
1-3 Years Experience
Cybersecurity
The Role

Data Analyst

The successful candidate will provide Data Analytics support to a dynamic Team comprised of section/technology areas that support operations and provide management of the government's Enterprise Network server and workstation systems to include reporting enterprise information. The candidate shall provide Tier III level reporting support and be responsible for operating and maintaining the currently deployed system as well as supporting full lifecycle development activities ranging from the development of minor enhancements to the development of major version releases and revisions.

The automation environment consists of VMWare Virtualization, Windows Server, Active Directory, Public Key Infrastructure (PKI), Exchange, SharePoint, BMC Remedy, and Azure Cloud technologies.

Active DoD - TS

The salary offered will depend on education, certifications, length, and relevance of work history, and professional experience.

  • Develop visual reports, scorecards, and dashboards with technologies associated with reporting.
  • Resolve reporting tickets escalated from the service desk to include executing associated administrative activities and providing a Weekly Status Report.
  • Provide documentation, guidance, and instruction to the Tier I Service Desk for handling standard reporting-related incidents, work orders, and service requests.
  • Submit and execute monitoring of related Request for Change (RFC) tasks.
  • Coordinate incident tickets between Tier II, Tier III, and other sections as required.
  • Analyze data sources to translate and transform them into meaningful visualizations and insights.
  • Provide project support for reporting-related technologies.
  • Support change management process; submit requests through the Change Approval Board; and participate in Change Review Boards.
  • Escalate product issues to third-party product vendors upon government approval.
  • Implement data models that are compatible with industry warehouse standards.
  • Provide analysis and remediation for Defense Information Systems Agency (DISA) Security Technical Implementation Guidelines (STIG) for all responsible technologies in preparation for the annual Commanders Cyber Readiness Inspection (CCRI).

  • Good communication and interpersonal skills
  • Ability to follow policies and procedures.
  • Ability to communicate information and ideas so others will understand, as well as the ability to respond clearly to questions.
  • Aptitude to address negative situations and positively resolve them.

  • DoD 8570 IAM Level I (e.g.: Sec+)
  • Bachelor's degree in a related field

  • At least three years of hands-on experience with query languages, such as SQL and Kusto to facilitate robust reporting capabilities.
  • IAT III certification (CASP+CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, or CSSP), can be attained within 180 days of hire.

  • Understanding of Microsoft (MS) Power Platform.
  • Power BI authoring, in combination with designing and integrating with data sources.
  • Tier III, Senior Level Experience with Kusto Query Language (KQL).
  • Tier III, Senior Level Experience with Structured Query Language (SQL).

  • General office environment. Work is generally sedentary but may require movement about the office for up to 10% of the time. The working environment is generally favorable. Lighting and temperature are adequate, and there are no hazardous or unpleasant conditions caused by noise, dust, etc. Work is generally performed within an office environment, with standard office equipment available.
  • Contractor site with 0-10% travel possible
  • Possible off-hours work to support releases and outages.
  • Occasional movement of small articles up to 10lbs
  • Must be able to remain in a stationary position 50% of the time.
  • Continually operates a computer and other office productivity machinery.
  • Occasionally required to move self in different positions to accomplish tasks in various environments including tight and confined spaces.
  • Continually required to communicate information and ideas so others will understand.
  • Continually utilize visual acuity to operate equipment, read technical information, and/or use a keyboard.

The above is intended to describe the general content of and requirements for the performance of this job. It is not to be construed as an exhaustive statement of duties, responsibilities, or physical requirements. Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. Reasonable accommodations may be made to enable individuals with disabilities to perform essential functions.

The Company
HQ: Fairfax, VA
64 Employees
On-site Workplace
Year Founded: 2008

What We Do

The only way to know if your organization can be breached by malicious hackers is to bring on a team of professional hackers, like BuddoBot, that are Built to Breach™.

What in the world is BuddoBot?

We love this question and we get it a lot from those who haven't heard of us. BuddoBot, founded in 2008, is a Veteran and Minority Owned Small Business that specializes in offensive cybersecurity. We emulate real world attacks specific to the industries and organizations we serve. We create threat vectors that are true-to-life, are able to think as the enemy thinks, and find potential threats and exploits before the bad guys do.

What does BuddoBot mean?

Buddo – A derivative of buddy.
Bot – A representation of technical efficiency and accuracy.

Combine the two and you have BuddoBot (pronounced Bud-o-Bot). Our name reflects our unique culture and collaborative approach. We are not a status-driven team. We roll up our sleeves and work hard because we are passionate about what we do. We strive for excellence by being organized and very thorough.

Equal Employment Opportunity Veterans/Disabled

Jobs at Similar Companies

Invoice Home Logo Invoice Home

Senior Ruby On Rails Software Developer

Fintech • Information Technology • Mobile • Software • Financial Services • Cybersecurity • SEO
Austin, TX, USA
20 Employees
120K-150K Annually

MacPaw Logo MacPaw

Malware Reverse Engineer for Moonlock

Information Technology • Security • Software • Cybersecurity • App development • Data Privacy
Remote
Hybrid
Kyiv, Kiev, UKR
550 Employees

Silverfort Logo Silverfort

Sales Development Representative

Information Technology • Sales • Security • Cybersecurity • Automation
Dallas, TX, USA
357 Employees

Similar Companies Hiring

Invoice Home Thumbnail
Software • SEO • Mobile • Information Technology • Fintech • Financial Services • Cybersecurity
Austin, TX
20 Employees
MacPaw Thumbnail
Software • Security • Information Technology • Data Privacy • Cybersecurity • App development
Cambridge, MA
550 Employees
Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
GB
357 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account