What are the responsibilities and job description for the Cybersecurity Analyst V position at Fynbosys Inc?
Job Details
Onsite Location: 530 Gaither Road, Rockville, MD (5-days on-site)
Exp: 13 yrs
- Website:
- About: X-energy is delivering the next generation of carbon-free energy by reinventing nuclear power. We believe in leaving a cleaner planet for our children and grandchildren, while continuing to provide sufficient and affordable power to sustain growing populations around the world. That is why we have reinvented nuclear power, with a unique combination of proven technologies and new innovations, to meet our current and future needs. X-energy manufactures fuel that seals uranium particles in a protective coating, which makes meltdown impossible and retains the waste inside forever. We also design plants that unlock the fuel s potential in a process that s as clean as wind or solar. When combined, the result is reliable carbon-free baseload power, produced more safely and affordable than ever before and available anywhere, at any time.
Job Description
This role is responsible for safeguarding the organization's digital assets by monitoring, responding to, and investigating suspected cyber threats and malicious activities across multiple environments. This role involves triage and data collection to support effective threat response and remediation. The analyst also collaborates with cross-functional teams to design and implement robust risk management, security, and governance programs to ensure compliance with industry standards and regulatory requirements.
Responsibilities:
- Execute risk management programs through planning, developing, coordinating, and implementing information technology disaster recovery and business continuity planning.
- Perform, assist, and review technical risk assessments and reviews of new and existing applications and systems, networks, servers, including data center physical security and environmental controls.
- Assist in conducting IT audits to ensure information systems security policies and procedures are being implemented as defined in security plans and best practices.
- Perform basic analyses to validate established security requirements and may recommend additional security requirements and safeguards.
- Prepare technical and security reports by collecting, analyzing, and summarizing project information.
- Monitor project progress by tracking activity, resolving problems, publishing progress reports, recommending actions.
- Develop and recommend plans to safeguard computer/server/network configurations and data files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Support and manage information security and risk management awareness and training programs.
- Assist with reviews of special investigations, internal audits, research studies to provide direction and guidance.
- Work with team members to design and oversee server-side elements of network infrastructure, including installing network-wide malware protection software, configuring firewalls, and configuring databases and access on the back end.
- Analyze vulnerability scans of information systems and assist in remediation tasks.
- Maintain professional demeanor and behavior at all times in all forms of communication.
- Lead the execution of the core tasks and responsibilities, listed in the Job Profile Task/Responsibilities section of this document, without close supervision and extensive latitude for independent judgment.
- Assist in detection, analysis, containment, remediation, and post-incident activities for incident response.
- Assist in documenting policies, procedures and plans for NIST and ISO frameworks.
- Provide feedback and guidance to more junior team members with the execution of the core tasks and responsibilities listed in the Job Profile Task/Responsibilities section of this document.
- Serve as a mentor to junior team members.
- Shares knowledge related to industry best practices and standards with others across the department/division.
- Perform other duties as assigned by manager.
Qualifications:
- Bachelor s degree in computer science, Information Technology, or a related field.
- Typically, fifteen years of experience in a Cybersecurity role required.
- Advanced certifications (e.g., CISSP, CISM).
- Direct knowledge and experience implementing ISO or NST risk and security management frameworks.
- Advanced-level knowledge of SIEM tools and incident response procedures.
- Advanced-level knowledge of relevant regulations and compliance frameworks (e.g., NIST, ISO 27001).
- Basic understanding of cybersecurity principles and tools.
- Familiarity with networking concepts and security protocols.