Jensen hughes

Cybersecurity Analyst

Remote - United States Full Time

Company Overview

Throughout our worldwide network of experts, clients and communities, we are renowned for our leadership in fire protection engineering – a legacy of responsibility we have proudly upheld since 1939. Today, our expertise extends broadly across closely related security and risk-based fields – from accessibility consulting and risk analysis to process safety, forensic investigations, security risk consulting, emergency management, digital innovation and more.

Our engineers and consultants collaborate to solve complex safety and security challenges, ensuring our clients can protect what matters most. For over 80 years, we have helped mitigate risks that threaten lives, property and reputations. Through technology, expertise and industry-leading research, we remain dedicated to our purpose of making our world safe, secure and resilient.

At Jensen Hughes, we believe that creating and sustaining a culture of trust, integrity and professional growth starts with putting our people first. Our employees are our greatest strength, and we value the unique perspectives and talents they bring to our organization. 

Our wide range of Global Employee Networks connect people from across the organization, supporting career development and providing forums for individuals to share experiences on topics they're passionate about. Together, we are cultivating a connected culture where everyone has the opportunity to learn, grow and succeed together.

Job Overview

We are hiring a Cybersecurity Analyst with a primary focus on Vulnerability Management, responsible for driving the execution, cadence, and effectiveness of the organization’s vulnerability management program.

In addition to this core responsibility, the role will support broader cybersecurity functions including endpoint security, identity governance, compliance support, and security operations. This is a hands-on execution role focused on discipline, consistency, and accountability while contributing to the overall security posture.

Responsibilities

Vulnerability management (primary focus)

  • Operate vulnerability management tools
  • Run and manage regular vulnerability scans across infrastructure, endpoints, and applications
  • Analyze and prioritize vulnerabilities using CVSS and business context
  • Maintain a consistent vulnerability management cadence (weekly/monthly cycles)
  • Drive reduction of critical and high-risk vulnerabilities

Remediation coordination & follow-through

  • Partner with IT, Cloud, and Enterprise Applications teams to drive remediation
  • Assign and track vulnerabilities to system owners
  • Follow up on remediation based on defined SLAs
  • Escalate overdue or high-risk vulnerabilities
  • Improve remediation turnaround times

Reporting & program visibility

  • Maintain dashboards and reports for vulnerability status
  • Provide structured updates on:
    • Open vulnerabilities
    • SLA adherence
    • Remediation progress
  • Support executive reporting with clear summaries

Security operations support (secondary scope)

  • Support endpoint security monitoring and enforcement
  • Assist with identity and access reviews
  • Participate in basic security incident triage (as needed)
  • Support implementation of security controls across systems

Compliance & audit support

  • Support vulnerability-related compliance activities (CMMC, NIST)
  • Assist with evidence collection and audit readiness
  • Ensure vulnerability data aligns with compliance requirements

Program discipline & improvement

  • Establish and maintain a repeatable vulnerability management lifecycle
  • Improve data accuracy and tracking discipline
  • Reduce backlog of aged vulnerabilities
  • Identify opportunities to improve patching and remediation processes

Requirements and Qualifications

Must-have qualifications:

  • + 3–6 years of experience in cybersecurity, with strong focus on vulnerability management
  • Hands-on experience with: o
    • Rapid7, CrowdStrike, or similar tools
  • Strong understanding of:
    • CVSS scoring
    • Vulnerability lifecycle
    • Patch management processes
  • Experience working with IT teams to drive remediation
  • Strong attention to detail and follow-through

Preferred qualifications

  • Experience in compliance-driven environments (CMMC, NIST)
  • Familiarity with:
    • Windows and Linux systems
    • Azure / AWS environments
  • Exposure to endpoint security and identity/access controls

Key outcomes

  • Consistent and predictable vulnerability management cadence
  • Reduction in critical and high-risk vulnerabilities
  • Improved SLA adherence for remediation
  • Clear and accurate vulnerability reporting
  • Reduced backlog of aged vulnerabilities
  • Increased contribution to overall cybersecurity operations

#LI-KV1

Please note that the salary range provided is a good faith estimate for the position at the time of posting and not a guarantee of compensation. Final compensation may vary  based on factors, including but not limited to, responsibilities of the job, education, experience, knowledge, skills, and abilities, geographic location, internal equity, alignment with market data.

 

Jensen Hughes offers a competitive total rewards package, which includes a retirement plan, healthcare coverage, and a broad range of other benefits. Incentives and/or benefit packages may vary depending on the position and location.

National Pay Range
$85,000$90,000 USD

Jensen Hughes is an Equal Opportunity Employer. Qualified candidates will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.

 

At Jensen Hughes, we embrace innovation and understand that people are increasingly using artificial intelligence (AI) tools like ChatGPT and other generative platforms to learn, prepare and communicate.  We have provided some guidelines regarding the responsible use of AI in the recruitment process.  Please click here to review.


The security of your personal data is important to us. Jensen Hughes has implemented reasonable physical, technical, and administrative security standards to protect personal data from loss, misuse, alteration, or destruction. We protect your personal data against unauthorized access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data.  Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including, but not limited to, the GDPR and the CCPA.  Additionally, our service providers are contractually bound to maintain the confidentiality of personal data and may not use the information for any unauthorized purpose.

 

*Policy on use of 3rd party recruiting agency for direct placements

Jensen Hughes will occasionally augment a recruiting search through agencies for certain positions when business conditions warrant. Jensen Hughes will not accept resumes, inquiries or proposals from recruiting agencies as an acceptable method to consider a candidate. 3rd party recruiting agencies must sign a standard Jensen Hughes agreement after being evaluated and accepted by a Human Resources or Talent Acquisition manager, or member of the talent acquisition team. Hiring managers and employees of Jensen Hughes are not authorized to accept resumes, engage in fee-based searches through recruiting firms or sign a search agreement. Please note this policy does not apply to “staffing firms” or firms that are involved with hiring temporary staff. Any recruiting agency interested in being considered may contact our recruiting team at jensenhughesrecruiting.com.