At a Glance
- Tasks: Monitor and secure information systems to support national defence missions.
- Company: Join INflow Federal, a leader in cybersecurity and defence solutions.
- Benefits: Competitive salary, professional growth, and a culture of innovation.
- Why this job: Make a real-world impact while working with cutting-edge technologies.
- Qualifications: Bachelor's degree in IT or relevant certification with security experience.
- Other info: Dynamic work environment with opportunities for career advancement.
The predicted salary is between 36000 - 60000 ÂŁ per year.
At INflow Federal, we’re not just building infrastructure—we’re shaping the future of national defense. We design and engineer secure, intelligent systems that empower mission success through the seamless integration of human insight and machine capability. With deep roots in Department of Defense (DoD) networks and a commitment to operational excellence, we deliver infrastructure that fuels advanced analytics, AI/ML, and data-driven decision‑making at scale. Every project is an opportunity to tackle complexity head‑on and build solutions that make a real‑world impact. Join INflow and help lead the charge toward a smarter, more connected defense landscape.
About This Position: INflow Federal is seeking an Information Security Analyst to support our Navy program. NNSY’s mission is to safely return warships to the Fleet on time and within budget, supported by secure and reliable information systems. As a Security Analyst, you will play a critical role in fulfilling this mission. Here, your work is more than a job—it’s a journey in innovation. With opportunities to work on high‑impact projects, access to the latest technologies, and a culture that thrives on creativity and collaboration, INflow Federal is where your expertise can truly make a difference.
Job Responsibilities
- Utilize cyber security tools and applications, including ACAS, HBSS, Microsoft Defender for Endpoint (MDE), Microsoft Defender for Identity (MDI), and Splunk, to monitor, analyze, and remediate security events.
- Configure, implement, and maintain firewall policies in accordance with security requirements and approved configurations.
- Manage and assess network ports and protocols to ensure secure and authorized communications.
- Perform risk assessments and risk mitigation analyses to reduce threats and vulnerabilities to acceptable levels.
- Support and execute Security Test and Evaluation (ST&E) activities to validate system security controls and compliance.
- Develop, maintain, and support contingency planning activities, including backup, recovery, and continuity of operations.
- Perform day‑to‑day Vulnerability Remediation Asset Management (VRAM) activities to track, prioritize, and resolve identified vulnerabilities.
- Enter and maintain system baseline configurations in VRAM by uploading and validating vulnerability scan results from representative baseline systems.
- Apply computer security (CS) and information security (INFOSEC) concepts, principles, and requirements to protect enterprise IT systems and data.
- Ensure compliance with cybersecurity requirements including FISMA, DoDD 8100.02, DoDI 8500.01, DoDI 8520, DoDI 8530, DoDI 8531, SECNAVINST 5239 series, OPNAVINST 5239 series, and NIST Special Publication 800 series.
- Maintain full qualification in accordance with DoD 8570.01‑M requirements.
Required Skills
- Demonstrated experience supporting cyber metrics analysis and reporting.
- Experience conducting incident response and mitigation activities.
- Experience performing risk mitigation analysis and developing corrective action recommendations.
- Experience developing and supporting contingency plans to ensure system resilience and continuity of operations.
Education & Certification Requirements
- Bachelor’s degree in an IT‑related discipline (or IAT Level II Certification) with a minimum of 4 years of security experience.
Clearance Requirements
- Active DoD Top Secret clearance is required in order to be considered for this position.
Citizenship Requirements
Please note that INflow Federal is a defense contractor. Pursuant to our government contracts, candidates must be U.S. Citizens to be considered for employment.
Other Notes
- Some travel may be required: Must have a valid driver’s license and transportation. This is subject to change at the direction of the customer.
- Candidate must have the ability to lift up to 50 lbs.
- Must have willingness to perform duties not listed in the job description as required by INflow and our customer.
Equal Opportunity Employer
INflow provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. This commitment applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, leaves of absence, compensation, and training. Job applicants and employees are evaluated solely on job‑related qualifications and experience.
Diversity and Inclusion
INflow provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. This commitment applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, leaves of absence, compensation, and training. Job applicants and employees are evaluated solely on job‑related qualifications and experience.
Information Security Analyst in Cornholme employer: INflow Federal
Contact Detail:
INflow Federal Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Information Security Analyst in Cornholme
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, especially those already at INflow. A friendly chat can open doors and give you insider info on what they're really looking for.
✨Tip Number 2
Show off your skills! If you’ve got experience with tools like Splunk or Microsoft Defender, make sure to highlight that in conversations. Practical examples of how you've tackled security challenges can really impress.
✨Tip Number 3
Prepare for the interview by brushing up on your knowledge of cybersecurity compliance standards. Knowing your FISMA from your DoDI will show you're serious about the role and ready to hit the ground running.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, it shows you’re genuinely interested in joining the INflow team.
We think you need these skills to ace Information Security Analyst in Cornholme
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Information Security Analyst role. Highlight relevant experience and skills that match the job description, especially those related to cyber security tools and risk assessments.
Craft a Compelling Cover Letter: Your cover letter should tell us why you're passionate about this role and how your background aligns with our mission at INflow Federal. Be sure to mention any specific projects or experiences that showcase your expertise in cybersecurity.
Showcase Your Certifications: If you have any relevant certifications, like IAT Level II or others mentioned in the job description, make them stand out! This can really boost your application and show us you're serious about your professional development.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows us you’re keen on joining our team!
How to prepare for a job interview at INflow Federal
✨Know Your Cybersecurity Tools
Familiarise yourself with the specific cybersecurity tools mentioned in the job description, like ACAS, HBSS, and Splunk. Be ready to discuss your experience with these tools and how you've used them to monitor and remediate security events in past roles.
✨Understand Risk Assessment
Brush up on risk assessment methodologies and be prepared to explain how you've conducted risk mitigation analyses before. Highlight any specific examples where your actions led to reduced vulnerabilities or improved system resilience.
✨Showcase Your Compliance Knowledge
Make sure you understand the compliance requirements listed, such as FISMA and NIST standards. Be ready to discuss how you've ensured compliance in previous positions and how you would approach it in this role.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving skills in real-world situations. Think of examples from your past experiences where you had to respond to incidents or develop contingency plans, and be ready to walk the interviewer through your thought process.