Vulnerability Analyst
D
Delan Associates, IncCybersecurity
United StatesContract
Salary not disclosed
Apply NowOpens the employer's application page
Job Details
- Languages
- English
- Required Skills
- DockerPythonBashCloud ComputingCybersecurityKubernetesCI/CDLinuxTerraform
Requirements
- Working level expertise with NIST Cybersecurity Framework (CSF) and NIST 800-53.
- Proficiency in vulnerability scanning tools (Tenable Security Center, Nucleus Security, Tenable, Nessus, Qualys, OpenVAS, Nexpose).
- Familiarity with penetration testing tools (Metasploit, Burp Suite, Nmap).
- Strong knowledge of Windows, Linux, and macOS operating systems.
- Understanding of system administration and security configurations.
- In-depth understanding of network protocols, architecture, and security.
- Experience with network scanning and monitoring tools.
- Ability to write scripts in Python, Bash, or PowerShell.
- Basic programming skills to analyze code for vulnerabilities.
- Familiarity with cybersecurity frameworks and standards (NIST, ISO 27001, CIS Controls, OWASP).
- Practical experience in conducting vulnerability assessments and/or penetration tests.
- Experience in system and network administration.
- Familiarity with security concerns in enterprise environments (application development, IT/OT, virtualization, containers).
- Strong analytical and problem-solving skills.
- Meticulous attention to detail.
- Excellent written and verbal communication skills.
- Ability to work collaboratively with cybersecurity professionals and IT staff.
- Considerable knowledge/experience of assessing security controls.
- Experience and skill in conducting audits or reviews of technical systems.
- Experience working in a government environment.
- Experience working in a distributed IT environment.
- Ability to obtain HSPD-12 card.
- Able to work both independently and as a contributing member of a team.
- Able to disseminate knowledge to current staff.
Responsibilities
- Identify, assess, prioritize, report, and assist in mitigating vulnerabilities.
- Conduct regular scans and assessments of systems, applications, and networks.
- Analyze vulnerabilities to determine potential impact and prioritize them based on severity.
- Recommend mitigation strategies and work with teams to implement remediation measures.
- Create detailed reports on findings and document the status of vulnerabilities.
- Communicate assessment results to stakeholders.
- Attend online meetings and provide status updates.
- Collaborate with IT and system administrators on patch management policies.
- Scan cloud posture, containers, images, application dependencies, and IaC manifests.
- Assist and guide business units with vulnerability remediation and technical debt cleanup.
- Create and update vulnerability risk acceptance/modification reviews.
- Document system workflows and identify opportunities for automation.
View Full Description & ApplyYou'll be redirected to the employer's site