Cyber Security Analyst

Koniag Government Services, LLCHuntsville, AL
Onsite

About The Position

The Cyber Security Analyst Mid/Journeyman supports cybersecurity operations, continuous monitoring, compliance, and DevSecOps initiatives across hybrid enterprise environments. This role helps secure applications, infrastructure, cloud platforms, and operational workflows through vulnerability management, audit readiness, security automation, centralized logging, and implementation of DoW cybersecurity requirements. The ideal candidate can operate effectively in both current-state on-premises environments and future-state cloud and containerized architecture.

Requirements

  • Working knowledge of cybersecurity and compliance principles related to: Secure application development, Secure cloud architecture, Server and platform administration, SQL and relational databases, Auditing, logging, and continuous monitoring, DoW Risk Management Framework (RMF), STIG implementation and vulnerability remediation
  • Experience supporting enterprise technologies in a DoW or similarly regulated environment.
  • Familiarity with centralized logging/SIEM platforms, such as Splunk or equivalent cloud-native logging and monitoring solutions.
  • Familiarity with security automation and administration tools such as Ansible, scripting, or policy/compliance automation tools.
  • Understanding of containerization, including Docker and Kubernetes security fundamentals.
  • Understanding of cloud security concepts, especially for Google Cloud or similar enterprise cloud platforms.
  • Familiarity with security scanning and assessment tools such as Nessus, Fortify, Semgrep, EvaluateSTIG, eMASS, or similar capabilities.
  • Familiarity with Red Hat Enterprise Linux 9 and enterprise Windows Server environments.
  • Familiarity with PowerShell, Python, or Bash for automation and analysis.
  • Understanding of TCP/IP, routing and switching, firewalls, DNS, LDAP/Active Directory, intrusion detection/prevention, and packet analysis fundamentals.
  • Familiarity with Zero Trust principles, incident response processes, endpoint protection, DLP, and malware defense concepts.
  • BS or equivalent experience in Computer Science, Data Engineering, Management or Computer Information Systems (MIS or CIS), or 60-months related experience specific to the position requirements
  • Must hold or be willing to obtain a CompTIA Security+ Certificate, or higher, prior to onboarding
  • Must have Active SECRET clearance prior to onboarding

Nice To Haves

  • Experience with Kubernetes, container registries, and container image security practices.
  • Experience with Splunk SPL or other query languages used for log analysis and detection engineering.
  • Experience supporting compliance in environments using React, .NET, APIs, JSON/XML, web services, and enterprise application hosting platforms.
  • Familiarity with Infrastructure as Code and secure configuration management concepts.

Responsibilities

  • Support cybersecurity operations for enterprise systems, applications, and platforms in accordance with DoW and organizational security requirements.
  • Assist with implementation and maintenance of continuous monitoring, audit logging, and security compliance processes.
  • Contribute to DevSecOps practices by integrating security into CI/CD pipelines, infrastructure deployments, and application delivery workflows.
  • Support vulnerability assessment and remediation activities, including coordination of findings from Nessus/ACAS, STIG reviews, code scanning, and configuration compliance tools.
  • Analyze and support security controls for cloud, containerized, and traditional server-based environments.
  • Assist with securing and monitoring Google Cloud and other hybrid/cloud-hosted services, including identity, logging, network controls, and workload protection.
  • Support secure deployment and operations of containers and container orchestration platforms such as Docker and Kubernetes.
  • Review system, application, and audit logs to identify anomalies, support investigations, and improve visibility across the enterprise.
  • Help maintain RMF documentation and artifacts, including control implementation evidence, POA&Ms, and eMASS support documentation.
  • Collaborate with system administrators, developers, engineers, and platform teams to implement secure configurations and improve cyber posture.
  • Support incident response, root cause analysis, and corrective action efforts as needed.
  • Participate in development and refinement of security automation, scripting, and repeatable compliance processes.
  • Perform other duties as assigned

Benefits

  • competitive compensation
  • health insurance
  • dental insurance
  • vision insurance
  • 401K with company matching
  • flexible spending accounts
  • paid holidays
  • three weeks paid time off
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service