VULNERABILITY ASSESSMENT ANALYST

Quantum Research International IncSpringfield, VA
1dOnsite

About The Position

Overview: Quantum Research International, Inc. (Quantum) is a certified DoD Contractor providing services and products to US/Allied governments and industry in the following main areas: (1) Cybersecurity, High Performance Computing Systems, Cloud Services and Systems; (2) Space and Ground Support Systems; (3) Aviation Systems; (4) Missile Systems; (5) Artificial Intelligence/ Machine Learning Systems and Experimentation/Training; and (6) Audio Visual Systems and Services. Quantum’s Corporate Office is in Huntsville, AL, but Quantum actively hires for positions nationwide and internationally. We pride ourselves on providing high quality support to the U.S. Government and our Nation’s Warfighters. In addition to our corporate office, we have physical locations in Aberdeen; MD; Colorado Springs, CO; Orlando, FL; Crestview, FL; Madison, AL, and Tupelo, MS. Mission:  As a member of the NGA DEFENDER Cybersecurity Risk Management team, the contractor executes the Risk Management Framework (RMF) in accordance with NIST SP 800-37 R2 (or subsequent versions) and National Geospatial-Intelligence Agency's (NGA) RMF Implementation Guide (RIG) for all NGA-authorized systems. This position supports NGA in Springfield, VA and is on-site only. No remote/hybrid work.

Requirements

  • Bachelor’s degree (technically relevant degree preferred). In lieu of degree, Sec+, GICSP, Cloud+, GCED, PenTest+, or GSEC may be accepted
  • DoD 8570 IAT or IAM Level 2 
  • TS/SCI eligible, subject to CI Polygraph.
  • Vulnerability management and mitigation.
  • Knowledge of computer networking concepts and protocols, and network security methodologies, risk management processes (e.g., methods for assessing and mitigating risk), and laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. 
  • Knowledge of cyber threats and vulnerabilities, and operational impacts of cybersecurity lapses. 
  • Knowledge of cryptography and cryptographic key management concepts and host/network access control mechanisms (e.g., access control list, capabilities list). 
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • Knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
  • Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities
  • Apply and incorporate information technologies into proposed solutions.
  • Apply the systems engineering process and design the integration of technology processes and solutions, including legacy systems and modern programming languages.
  • Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Nice To Haves

  • Apply and incorporate information technologies into proposed solutions.
  • Apply the systems engineering process and design the integration of technology processes and solutions, including legacy systems and modern programming languages.
  • Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Responsibilities

  • Perform assessments of systems and networks within the network environment or enclave and identifying where those systems/networks deviate from acceptable configurations, enclave policy, or local policy.
  • Develop measures of effectiveness for defense-in-depth architectures against known vulnerabilities.
  • Identify systemic security issues based on the analysis of vulnerability and configuration data.
  • Conduct vulnerability scans and mitigate vulnerabilities in security systems.
  • Review logs to identify evidence of past intrusions and conduct application vulnerability assessments.
  • Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • Review, promulgate, and track Cyber Task Orders. Coordinate and assist the relevant information system owners to resolve findings.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service