A Fortune 50 financial services company is seeking a highly motivated Technical Analyst for their team in the McLean, Virginia area.
Responsibilities:
- Review and analyze alerts generated by secret-scanning platforms to identify exposed or insecurely stored credentials
- Support Non-Human Identity (NHI) management, including governance, lifecycle oversight, and alignment with enterprise security policies
- Monitor and enforce secret rotation compliance, ensuring credentials are rotated according to regulatory and internal standards
- Partner with application teams, system owners, and engineering teams to remediate compromised credentials and enforce secure workflows
- Collaborate with security engineers to validate findings, confirm ownership, and assess risk impact
- Track findings end-to-end, ensuring timely remediation and accurate ownership attribution
- Assist in improving scanning accuracy and remediation processes in partnership with engineering teams
- Serve as a liaison between IAM and business teams to support secure credential usage practices
- Develop and deliver metrics, dashboards, and reporting on security posture, including MTTR, exposure trends, and repeat findings
- Maintain procedural documentation and automation runbooks to support operational consistency
Qualifications:
- 10+ years of experience in cybersecurity, identity and access management (IAM), secrets management, or related information security roles
- Bachelor’s degree in Information Technology, Cybersecurity, or related field, or equivalent experience
- Knowledge of IT security policies, procedures, and identity governance frameworks
- Understanding of foundational security concepts such as authentication, authorization, and Zero Trust principles
- Experience with secret-scanning tools, credential discovery platforms, or security monitoring workflows
- Familiarity with Identity and Access Management (IAM) concepts and secure access controls
- Strong analytical and problem-solving skills with the ability to manage multiple priorities
Desired Qualifications:
- Experience generating security metrics, dashboards, and audit reporting
- Exposure to Privileged Access Management (PAM) tools such as CyberArk
- Ability to translate technical findings into actionable business recommendations
- Experience working in multi-cloud environments (AWS, Azure, OCI) with secrets management practices
- Strong process improvement mindset with focus on security, efficiency, and operational excellence
- Ability to collaborate across engineering, infrastructure, and business teams as a trusted advisor



