Executes security scanning and remediation operations under the guidance of the Vulnerability Management Lead on assigned government-authorized systems. Will be responsible for performing compulsory scans of assigned information systems, including vulnerability, network detection and mapping, and controlled interfaces. The candidate must be knowledgeable on a variety of vulnerability assessment tools, including Rapid 7 Nexpose, NMAP, and Nipper, or similar security tools. Additionally, the candidate must be able to create and interpret scan reports and recommend prioritized remediation plans. Ability to script and develop parsing tools preferred, such as BASH, Python and/or PowerShell scripts, etc. Other responsibilities may include: authoring and maintaining documentation supporting the Assessment & Authorization (A&A) of assigned systems in accordance with the Risk Management Framework (RMF) under the ICD503, JSIG and NISPOM; performing security control assessments as part of the system’s Continuous Monitoring Plan; overseeing configuration management of assigned systems; working with various stakeholders within the organization to develop device and system hardening guides following DISA and NIST guidelines; auditing systems to ensure security posture integrity; conduct periodic hardware/software inventory assessments; identifying system security controls shortcomings and developing POA&Ms; remediating control deficiencies; conducting, documenting and reporting annual self-assessments; maintaining operational information security posture for a system, program, or enclave; assist with investigating security incidents such as data spills, data integrity infractions, and malicious events; authoring and delivering security education and training to a range of audiences, as needed.