Title: Cyber Risk Analyst
W-2 Only (no 1099)
Must be a U.S. Citizen
Company's Location: Lemont, IL
Job Description
Background:
Companys Cyber Security Program Office (CSPO) promotes the safe and secure use of technology. The CSPO serves Company by providing a variety of cybersecurity services including consultation, protection technologies, detection technologies, cybersecurity education and awareness, cybersecurity incident management, vulnerability management, compliance, and cybersecurity risk management.
The Cyber Security Program Office is seeking a full-time Vulnerability Analyst.
Contract Position: Full Time, 40 hour work week
Period of Performance: 1 Year
Scope:
This is an opportunity for a Vulnerability Analyst within the Cyber Security Program Office (CSPO). The Vulnerability Analyst will play an important role to identify, assess, prioritize, report, and assist others in mitigating vulnerabilities within an organization's information systems. This engagement will free up other cybersecurity resources to work in other critical Company areas.
Objectives:
The ideal candidate will support the projects and tasks associated with Vulnerability Management Program
Technical Direction of Work:
Report to the Lead Cybersecurity Engineer within the Cyber Security Program Office (CSPO); including daily guidance and collaboration with others in the Cyber Security Program Office (CSPO).
Task and Time Reporting:
The project managers measure work performed by the contractor on a task basis. The tasks typically represent 8 to 80 hours of effort with performance being measured at the completion of each of the assigned tasks. Hours will be recorded on a weekly time sheet; progress against planned tasks will be reported weekly.
Typically, the work is performed remotely. For the candidate within driving distance of the Lab, there may be rare times to be onsite for in-person meetings, assessments, or presentations. Most of the Business Information Services (BIS) Division works remotely and are rarely onsite. If the candidate is out of state, too far away from the Lab, onsite meetings are not feasible to attend and not required.
Management and Remediation Plan:
Cloud, Container, and DevSecOps
Expectation/Deliverables:
Qualifications:
Technical Skills:
Vulnerability Assessment Tools:
Operating Systems:
Networking:
Scripting and Programming:
Security Frameworks and Standards:
Certifications (Optional):
Experience:
Government-Furnished Property:
Computer Protection Program:
The contractor shall adhere to all policies and procedures of the ANL Computer Protection Program, must not bypass any procedures established to protect data, applications, hardware, or communications at ANL, must maintain a work environment that will satisfy audit, privacy, and protection requirements, and must report any findings of inadequacies to the technical contact and the BIS Computer Protection Program Representative.
The following expectations are part of working remote:
Place of Performance :
Work will be performed remotely (within the confines of the United States of America), and team communication will be done through Microsoft tools such as Microsoft Teams and Microsoft Outlook
Period of Performance:
Work would begin October 2025, for 40 hours per week for 1 year.