Associate Cyber Security Analyst (Remote)

ICFReston, VA
$61,232 - $104,094Remote

About The Position

This is an entry-level position expected to begin Summer 2026, and is fully-remote from any U.S. location. Travel 1-2 times per year may be required. This is a non-exempt position. The Associate Cyber Security Analyst supports the day‑to‑day operation of ICF’s information security program under the guidance of senior security staff and the Cyber Security Manager. This role assists with monitoring, maintaining, and documenting security controls and technologies, including endpoint protection, access controls, vulnerability management, and security event monitoring. Working closely with experienced analysts and internal stakeholders, the Associate Cyber Security Analyst helps identify, document, and escalate security issues, supports routine security operations, and contributes to security assessments and reporting. The role provides hands‑on exposure to and guidance with incident response, compliance activities, and security tooling while developing technical and professional cybersecurity skills in a structured, supportive environment. The Associate Cyber Security Analyst supports routine security operations, including security monitoring, service requests, evidence gathering, and incident response support, while collaborating with IT, compliance, and other security stakeholders. The role contributes to security awareness, risk remediation, and ongoing security improvement efforts while continuing to develop technical and professional security skills.

Requirements

  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field or equivalent practical experience.
  • Working knowledge of Windows, macOS, and/or Linux operating systems.
  • Foundational understanding of networking concepts, including the OSI model, TCP/IP, routing, and switching.
  • Familiarity with scripting or query languages such as PowerShell, Python, Java, or SQL.

Nice To Haves

  • 1–2 years of general technology experience (including internships, academic projects, or relevant hands‑on work).
  • Foundational knowledge of information security principles, common security practices, and log monitoring/analysis concepts.
  • Familiarity with cloud platforms (Azure and/or AWS) and common security tools through coursework, labs, or hands‑on experience (e.g., vulnerability scanners, network analysis tools, penetration testing frameworks).
  • Exposure to security monitoring and incident response fundamentals, including network traffic analysis.
  • Basic scripting or automation experience (e.g., simple scripts or academic projects).
  • Awareness of emerging technologies, including the use of generative or agentic AI in security contexts.
  • Strong interest in learning and developing cybersecurity skills.
  • Ability to manage multiple tasks, adapt to changing priorities, and operate effectively in time‑sensitive situations.
  • Demonstrated professionalism and discretion in handling sensitive information.
  • Flexibility to support extended hours or incident response activities, as needed.
  • Entry‑level cybersecurity certifications (e.g., CompTIA Security+ or equivalent) a plus.

Responsibilities

  • Supports the day‑to‑day operation of ICF’s information security program under the guidance of senior security staff and the Cyber Security Manager.
  • Assists with monitoring, maintaining, and documenting security controls and technologies, including endpoint protection, access controls, vulnerability management, and security event monitoring.
  • Helps identify, document, and escalate security issues.
  • Supports routine security operations.
  • Contributes to security assessments and reporting.
  • Provides hands‑on exposure to and guidance with incident response, compliance activities, and security tooling.
  • Supports routine security operations, including security monitoring, service requests, evidence gathering, and incident response support.
  • Collaborates with IT, compliance, and other security stakeholders.
  • Contributes to security awareness, risk remediation, and ongoing security improvement efforts.
  • Learns and applies foundational professional and cybersecurity concepts while following established company policies and procedures.
  • Performs structured, well‑defined assignments to resolve routine issues, with work reviewed by senior team members as part of ongoing skill and competency development.
  • Works on problems of limited scope by following established practices and procedures to analyze routine situations or data where solutions are well defined.
  • Builds stable, collaborative working relationships within the organization while escalating more complex issues as appropriate.
  • Work is initially closely managed, with detailed guidance and oversight provided for assigned tasks.
  • Regularly interacts with functional peers within the immediate organization.
  • Interaction normally involves exchange or presentation of factual information.
  • Assists with security request and incident ticket intake, triage, and escalation.
  • Support the collection and creation of artifacts for audit and compliance activities.
  • Analyze security log data to identify emerging or unusual patterns.
  • Review and help validate vulnerability findings using established processes.
  • Assist with the operation of infrastructure and application vulnerability scanning tools.
  • Research and test emerging threats, vulnerabilities, and security techniques.
  • Assist in modifying or proposing security alerts for events of interest.
  • Participate in on‑call rotations as part of a team, with guidance and escalation support.
  • Assist with disaster recovery and incident response testing and exercises.

Benefits

  • ICF is an equal opportunity employer.
  • Reasonable Accommodations are available, including, but not limited to, for disabled veterans, individuals with disabilities, and individuals with sincerely held religious beliefs, in all phases of the application and employment process.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service