Cyber Security Analyst
Listed on 2026-01-24
-
IT/Tech
Cybersecurity
Boston Government Services, LLC. (BGS) has created this Evergreen Talent Pool post for gathering qualified candidates for a position relating to Cyber Security Analyst which would support our clients.
BGS is an engineering, technology, and security firm helping to advance missions of national importance for government programs, national laboratories, national security facilities, nuclear operations, and complex commercial projects. We support clients at every stage, from strategic planning and program management to the execution of project management, procurement, supply chain management, quality, safety, security, nuclear and systems engineering and technical activities.
We strive to attract and retain the best talent because it delivers the best results and "Delivery Certainty" for our clients. Our capabilities are based on our experience in complex, secure, and highly regulated environments. We leverage our expertise and capabilities to provide mission-driven integrated services, systems, and solutions tuned to our clients' mission needs, challenges, requirements, expected results, and strategic direction.
We are passionate about our culture! At BGS, we hire people who will bring their whole self to work each day because we value operating with openness and inclusivity, welcoming and respecting all. BGS cares for each employee's well-being by offering a comprehensive benefit package and providing a culture of exciting work, excellence, and fun.
If you align with BGS' company values and culture, we would love for you to explore opportunities to join our growing team by checking out the job description below!
Duties/Responsibilities Include:
- Resetting user passwords for cause (e.g., when they have been identified as being suspected compromised or 'known compromised').
- Working with service owners to reset service account passwords for various reasons.
- Ensuring authorize rs are designated for in-scope accounts.
- Analyzing usage patterns for accounts (e.g., service, administrative) to identify inactive accounts or inappropriate account use.
- Reviewing approval requests for various new access or accounts.
- Triaging unusual access requests (e.g., access from 3 rd party VPN providers, impossible travel) or phishing reports.
- Evaluate endpoint and detection response (EDR) installation and coverage.
- Identify systems without EDR and provide to IT teams for remediation.
- Monitoring external attack surface for unapproved systems, undocumented systems, and newly disclosed vulnerabilities.
- Reviewing systems with existing public access to ensure requirements for these systems are followed (e.g., event logging, multifactor authentication).
- Attend online/Teams meetings with team and others as appropriate.
- Work with team to provide status on current task, suggest improvements, discuss implementation, etc.
- Analyze data and perform initial planning to address identified issues.
- Assist with the creation of playbooks to address identified issues.
- Seek to understand the intention of detections and corresponding playbooks.
- Execute various playbooks dealing with identified issues with minimal assistance (e.g., identification of compromised passwords, inappropriate use of administrative accounts, systems not providing event logs, systems without a functional EDR installed).
- Adapt on-the-fly when an existing playbook is insufficient.
- Provide basic feedback on playbooks and detections.
- Produce clear reports (MTTD/MTTR, FP rate, backlog) for technical and executive audiences; maintain thorough case notes.
- Recommend additional new use cases for detections based on an analysis of threats and data.
- Identify telemetry quality and visibility issues (SIEM parsing/normalization, EDR/XDR sensor health, asset/identity tagging).
- Conduct proactive threat hunts; convert findings into new detections and control recommendations.
- Create advanced use cases for detections based on an analysis of threats and data, including sample criteria to identify the behavior and mapping detections to MITRE Telecommunication & CK.
- Drive continuous improvements to existing processes or tooling.
- Perform quality reviews and improve handoffs/runbooks.
- Coach, guide, teach others on the team.
- Lead investigations end-to-end (triage to containment), delivering timelines, root cause, scope, IOCs, and impacted assets.
- Execute/coordinate containment and remediation (host isolation, credential resets, blocks) with proper approvals and verification.
- Experience in system and network administration.
- Staying up to date with the latest cyber security threats, vulnerabilities, and best practices.
- Strong analytical and problem-solving skills.
- Meticulous attention to detail to ensure thorough assessments and accurate reporting.
- Excellent written and verbal communication skills to effectively convey findings and recommendations to technical and non-technical stakeholders.
- Ability to work collaboratively with other cyber…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).