INSPYR Solutions

INSPYR Solutions

Secrets Management Technical Analyst

Merrifield, Virginia, USContractor3 days agovia LinkedIn

Salary

-

Job type

Contractor

Location

Merrifield, Virginia, US

Remote

No

Posted

3 days ago

Resume Examples

Browse professional resume examples with key skills, action verbs, and ATS-friendly formatting.

Browse resume examples

Job description

Title: Secrets Management Technical Analyst Location: REMOTE Duration: Initial 6 months contract with extensions Compensation: $62.00-$72.00/hr Work Requirements: US Citizen, GC Holders or or Authorized to work in US

Summary The Secrets Management Technical Analyst is responsible for discovering, compiling, researching, analyzing, and documenting data, requirements, workflows, controls, and business processes within Enterprise Security Product & Services. This role serves as a subject matter expert and liaison across technical and business teams, supporting cybersecurity compliance and secure credential‐handling practices. The analyst will support Secrets Management operations, ensuring rapid remediation of exposed credentials identified by automated scanning tools. Key Responsibilities:

  • Discover, Review, validate, and analyze alerts generated by secret‐scanning platforms to identify insecurely stored or exposed secrets.
  • Support Non Human Identity (NHI) management, including governance, lifecycle oversight, and alignment of system/service accounts with enterprise security policies.
  • Monitor and enforce secret rotation compliance, ensuring credentials are rotated according to policy and assisting teams in meeting regulatory and internal rotation requirements.
  • Coordinate with application teams, business owners, system owners, and engineering partners to remediate compromised credentials and enforce secure rotation workflows.
  • Collaborate with security engineers to validate findings, confirm ownership, and assess the impact of policy or process changes.
  • Track findings end‐to‐end, ensuring timely resolution and accurate attribution of ownership.
  • Assist in improving scanning accuracy and optimizing discovery and remediation pipelines in partnership with engineering teams.
  • Serve as liaison between IAM and business partners to ensure cohesive remediation and secure credential usage practices.
  • Prepare and deliver metrics and dashboards related to exposed secrets, mean‐time‐to‐detect/remediate, repeat offenders, and security posture trends.
  • Support Non‐Human Identity (NHI) management, including governance, lifecycle oversight, and alignment of system/service accounts with enterprise security policies.
  • Monitor and enforce secret‐rotation compliance, ensuring credentials are rotated according to policy and assisting teams in meeting regulatory and internal rotation requirements.
  • Maintain procedural documentation and create automation runbooks Qualifications:
  • Bachelor's Degree in Information Technology, Cybersecurity, or other related field, or the equivalent combination of education, training or experience
  • Knowledge of IT policies, security procedures, and identity governance frameworks.
  • Understanding of foundational security concepts (AAA, authentication fundamentals, Zero Trust).
  • Experience with secret‐scanning technologies, automated discovery tools, or credential hygiene workflows.
  • Familiarity with IAM concepts, incident response processes, and secure access management for Enterprise Security Product & Services. Desired Qualifications
  • Experience generating security metrics, supporting risk mitigation, or assembling audit evidence.
  • Exposure to Privileged Access Management (PAM) tools such as CyberArk.
  • Ability to translate technical findings into clear, actionable business recommendations.
  • Process‐improvement mindset with a focus on security, quality, and operational efficiency.
  • Ability to serve as a trusted advisor to development, infrastructure, and business teams.
  • Experience with secret management on the Multicloud (AWS, OCI, Azure)

Our benefits package includes

  • Comprehensive medical benefits
  • Competitive pay, 401(k)
  • Retirement plan
  • …and much more!

About INSPYR Solutions: Technology is our focus and quality is our commitment. As a national expert in delivering flexible technology and talent solutions, we strategically align industry and technical expertise with our clients’ business objectives and cultural needs. Our solutions are tailored to each client and include a wide variety of professional services, project, and talent solutions. By always striving for excellence and focusing on the human aspect of our business, we work seamlessly with our talent and clients to match the right solutions to the right opportunities. Learn more about us at inspyrsolutions.com.

INSPYR Solutions provides Equal Employment Opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability, or genetics. In addition to federal law requirements, INSPYR Solutions complies with applicable state and local laws governing nondiscrimination in employment in every location in which the comp any has facilities.

Information collected and processed through your application with INSPYR Solutions (including any job applications you choose to submit) is subject to INSPYR Solutions’ Privacy Policy and INSPYR Solutions’ AI and Automated Employment Decision Tool Policy: https://www.inspyrsolutions.com/policies/. By submitting an application, you are consenting to being contacted by INSPYR Solutions through phone, email, or text.

Responsibilities

  • The Secrets Management Technical Analyst is responsible for discovering, compiling, researching, analyzing, and documenting data, requirements, workflows, controls, and business processes within Enterprise Security Product & Services
  • This role serves as a subject matter expert and liaison across technical and business teams, supporting cybersecurity compliance and secure credential‐handling practices
  • The analyst will support Secrets Management operations, ensuring rapid remediation of exposed credentials identified by automated scanning tools
  • Discover, Review, validate, and analyze alerts generated by secret‐scanning platforms to identify insecurely stored or exposed secrets
  • Support Non Human Identity (NHI) management, including governance, lifecycle oversight, and alignment of system/service accounts with enterprise security policies
  • Monitor and enforce secret rotation compliance, ensuring credentials are rotated according to policy and assisting teams in meeting regulatory and internal rotation requirements
  • Coordinate with application teams, business owners, system owners, and engineering partners to remediate compromised credentials and enforce secure rotation workflows
  • Collaborate with security engineers to validate findings, confirm ownership, and assess the impact of policy or process changes
  • Track findings end‐to‐end, ensuring timely resolution and accurate attribution of ownership
  • Assist in improving scanning accuracy and optimizing discovery and remediation pipelines in partnership with engineering teams
  • Serve as liaison between IAM and business partners to ensure cohesive remediation and secure credential usage practices
  • Prepare and deliver metrics and dashboards related to exposed secrets, mean‐time‐to‐detect/remediate, repeat offenders, and security posture trends
  • Support Non‐Human Identity (NHI) management, including governance, lifecycle oversight, and alignment of system/service accounts with enterprise security policies
  • Monitor and enforce secret‐rotation compliance, ensuring credentials are rotated according to policy and assisting teams in meeting regulatory and internal rotation requirements
  • Maintain procedural documentation and create automation runbooks

Qualifications

  • Work Requirements: US Citizen, GC Holders or or Authorized to work in US
  • Bachelor's Degree in Information Technology, Cybersecurity, or other related field, or the equivalent combination of education, training or experience
  • Knowledge of IT policies, security procedures, and identity governance frameworks
  • Understanding of foundational security concepts (AAA, authentication fundamentals, Zero Trust)
  • Experience with secret‐scanning technologies, automated discovery tools, or credential hygiene workflows
  • Familiarity with IAM concepts, incident response processes, and secure access management for Enterprise Security Product & Services

Benefits

  • Duration: Initial 6 months contract with extensions
  • Compensation: $62.00-$72.00/hr
  • Our benefits package includes:
  • Comprehensive medical benefits
  • Competitive pay, 401(k)
  • Retirement plan
  • …and much more!

Stand out from other applicants

AI reads this job description and tailors your resume to match, optimized for ATS filters.

Similar jobs

Ready to land your next role?

Join thousands of professionals who use Mokaru to manage their job search. AI-powered resume tailoring, application tracking, and more.

Create Free Resume