About The Position

The Security & Compliance Analyst will play a critical role in safeguarding Navitas systems, data, and infrastructure across cloud-based and on‑premises environments. This position is responsible for implementing, monitoring, and enforcing security policies, frameworks, and compliance controls to ensure adherence to federal and Department of Defense (DoD) cybersecurity requirements. The ideal candidate brings deep technical expertise, strong analytical skills, and hands‑on experience supporting secure, compliant enterprise environments.

Requirements

  • Bachelor’s degree in Cybersecurity, Information Assurance, Computer Science, or a related field; or a minimum of five (5) years of equivalent experience in security and compliance roles
  • Demonstrated experience conducting security audits and assessing system compliance with DoD cybersecurity policies.
  • Hands‑on experience implementing and managing security controls in cloud and hybrid environments Proficiency with:
  • NIST 800‑53 and FedRAMP frameworks
  • DoD IL‑4/5 security requirements
  • Risk assessment methodologies
  • IAM technologies and processes
  • Security monitoring tools (Splunk, SIEM solutions)
  • Zero‑trust architecture principles
  • Vulnerability assessment frameworks
  • Experience with security automation, endpoint protection platforms, and incident response workflows.
  • Active TS/SCI

Nice To Haves

  • Professional certifications such as:
  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • AWS Certified Security – Specialty

Responsibilities

  • Implement, maintain, and enforce security policies, standards, and compliance frameworks across cloud and hybrid infrastructures.
  • Monitor security controls and system configurations to ensure alignment with NIST 800‑53, FedRAMP, and DoD IL‑4/5 security requirements.
  • Conduct comprehensive security audits, compliance assessments, and risk evaluations to identify vulnerabilities and recommend remediation strategies.
  • Support identity and access management (IAM) processes, ensuring proper authorization, authentication, and least‑privilege enforcement.
  • Utilize security monitoring tools—including Splunk and other SIEM platforms—to detect, analyze, and escalate security events.
  • Apply zero‑trust architecture principles to strengthen enterprise security posture.
  • Perform vulnerability assessments and support remediation activities across cloud and on‑premises systems.
  • Assist in the development and automation of security processes to improve efficiency and reduce operational risk.
  • Support endpoint protection technologies and contribute to incident response activities, including triage, containment, and documentation.
  • Collaborate with cross‑functional teams to ensure systems and applications meet DoD cybersecurity and compliance requirements.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service