

Data Analyst
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Data Analyst with a contract length of "X months" and a pay rate of "$X per hour". Required skills include 2-3 years in cybersecurity, experience with encryption configuration, and proficiency in tools like Splunk and Power BI.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
-
ποΈ - Date discovered
June 17, 2025
π - Project duration
Unknown
-
ποΈ - Location type
Unknown
-
π - Contract type
Unknown
-
π - Security clearance
Unknown
-
π - Location detailed
Reston, VA
-
π§ - Skills detailed
#Splunk #Cloud #BI (Business Intelligence) #Scripting #Automation #Documentation #Data Encryption #Python #AWS (Amazon Web Services) #Monitoring #Azure #Classification #Compliance #Cybersecurity #Data Analysis #Data Security #Data Manipulation #Security #Microsoft Power BI
Role description
Heading 1
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Block quote
Ordered list
- Item 1
- Item 2
- Item 3
Unordered list
- Item A
- Item B
- Item C
Bold text
Emphasis
Superscript
Subscript
Description:
β’ The Data Encryption Analyst is responsible for implementing a cryptographic inventory process that includes collecting cryptographic configuration settings from network(s) and applications to identify the use of weak settings, engage respective asset owners, follow-up and track configuration updates.
β’ The Data Encryption Analyst is also responsible for gathering requests for guidance from application teams and working with a cross-functional subject matter expert (SMEs) to identify possible solutions and provide guidance.
β’ The person preferably has hands-on experience in configuring TLS, including tasks like obtaining a certificate from a trusted CA, installing it on the system, defining cipher suites, and ensuring proper TLS handshake.
β’ Prior experience with encryption key management, including implementing policies, monitoring compliance, and ensuring secure handling of cryptographic materials, is preferred.
Required Skills:
β’ 2-3 years of experience collecting encryption configuration settings from a variety of network and application security tools, correlate, analyze, and provide actionable insights.
β’ Strong understanding of cryptographic standards and their use (Encryption, Hashing, Digital Certificates, Digital Signature, etc).
β’ Knowledge of data classification, encryption, and key management.
β’ Experience in working with any of the following tools: Extra Hop, Nessus, Tenable, Wiz, Splunk, or any other security monitoring tools.
β’ Strong analytical skills using Excel or Power BI, and problem-solving skills with attention to detail.
β’ Excellent communication and documentation abilities.
β’ Working experience in cybersecurity, data security, or data protection operations.
Nice to Have:
β’ Thorough understanding of the Public Key Infrastructure (PKI), secure encryption algorithms, modes, and the Transport Layer Security (TLS).
β’ Understanding of symmetric and asymmetric encryption and respective use cases.
β’ Familiarity with cryptographic services in AWS, Azure, and Google Cloud.
β’ Use of scripting languages (e.g., Python) for data manipulation and automation.
β’ Certifications in information security.