Vulnerability Analyst

D
United StatesContract
Salary not disclosed
Apply NowOpens the employer's application page

Job Details

Languages
English
Required Skills
DockerPythonBashCloud ComputingCybersecurityKubernetesCI/CDLinuxTerraform

Requirements

  • Working level expertise with NIST Cybersecurity Framework (CSF) and NIST 800-53.
  • Proficiency in vulnerability scanning tools (Tenable Security Center, Nucleus Security, Tenable, Nessus, Qualys, OpenVAS, Nexpose).
  • Familiarity with penetration testing tools (Metasploit, Burp Suite, Nmap).
  • Strong knowledge of Windows, Linux, and macOS operating systems.
  • Understanding of system administration and security configurations.
  • In-depth understanding of network protocols, architecture, and security.
  • Experience with network scanning and monitoring tools.
  • Ability to write scripts in Python, Bash, or PowerShell.
  • Basic programming skills to analyze code for vulnerabilities.
  • Familiarity with cybersecurity frameworks and standards (NIST, ISO 27001, CIS Controls, OWASP).
  • Practical experience in conducting vulnerability assessments and/or penetration tests.
  • Experience in system and network administration.
  • Familiarity with security concerns in enterprise environments (application development, IT/OT, virtualization, containers).
  • Strong analytical and problem-solving skills.
  • Meticulous attention to detail.
  • Excellent written and verbal communication skills.
  • Ability to work collaboratively with cybersecurity professionals and IT staff.
  • Considerable knowledge/experience of assessing security controls.
  • Experience and skill in conducting audits or reviews of technical systems.
  • Experience working in a government environment.
  • Experience working in a distributed IT environment.
  • Ability to obtain HSPD-12 card.
  • Able to work both independently and as a contributing member of a team.
  • Able to disseminate knowledge to current staff.

Responsibilities

  • Identify, assess, prioritize, report, and assist in mitigating vulnerabilities.
  • Conduct regular scans and assessments of systems, applications, and networks.
  • Analyze vulnerabilities to determine potential impact and prioritize them based on severity.
  • Recommend mitigation strategies and work with teams to implement remediation measures.
  • Create detailed reports on findings and document the status of vulnerabilities.
  • Communicate assessment results to stakeholders.
  • Attend online meetings and provide status updates.
  • Collaborate with IT and system administrators on patch management policies.
  • Scan cloud posture, containers, images, application dependencies, and IaC manifests.
  • Assist and guide business units with vulnerability remediation and technical debt cleanup.
  • Create and update vulnerability risk acceptance/modification reviews.
  • Document system workflows and identify opportunities for automation.
View Full Description & ApplyYou'll be redirected to the employer's site
View details
Apply Now