Vulnerability Assessment Analyst

ISYS TechnologiesStennis, MS
1dOnsite

About The Position

I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, the Department of Defense and often focused on the space initiatives of our government customers. I2X Technologies is seeking a Vulnerability Assessment Analyst to support ongoing activities for a customer at Stennis Space Center, MS . This position will be fully on-site and will require an active TS/SCI . Lead the Vulnerability Analysis function of the overall Vulnerability Assessment Team, working with the Vulnerability Management function and Penetration Testing function under a unified Vulnerability Assessment Lead Create and publish security-related alerts, bulletins, advisories, and notifications to all DHS components based on identified software and hardware vulnerabilities and monitor for compliance Continuously research emerging threats to the environment in order to disseminate the information to all stakeholders, immediately assess the known environment for presence of the vulnerability, and work with the NOSC, Enterprise VAT, and enterprise networking teams to proactively block exploitation within the DHS environment Conduct scheduled and ad-hoc vulnerability/compliance scanning Create and maintain scans in support of continuous scanning requirements for various FISMA systems Employ ad-hoc or emergency vulnerability/compliance scanning to support targeted incident investigation, escalation, and emergency response to security events in accordance with documented procedures Coordinate with NOSC cybersecurity leadership and FISMA system ISSOs and system owners to explain findings, provide recommendations on mitigations, and advocate for mitigation of vulnerabilities Track and trend vulnerabilities for HQ NOSC to assess and depict risk posture Correlate CISA KVEs and incorporate into NOSC scanning as applicable Conduct, operate, and maintain vulnerability/compliance assessments and the resulting data and reports Conduct Host-based and Network Vulnerability Assessments Conduct Database Vulnerability Assessments Conduct Web-based Vulnerability Assessments Author and maintain SOPs and runbooks Other duties as assigned

Requirements

  • BS degree with 12 years of experience or MS degree with 10-13 years of experience
  • US Citizenship is required.
  • active TS/SCI

Responsibilities

  • Lead the Vulnerability Analysis function of the overall Vulnerability Assessment Team, working with the Vulnerability Management function and Penetration Testing function under a unified Vulnerability Assessment Lead
  • Create and publish security-related alerts, bulletins, advisories, and notifications to all DHS components based on identified software and hardware vulnerabilities and monitor for compliance
  • Continuously research emerging threats to the environment in order to disseminate the information to all stakeholders, immediately assess the known environment for presence of the vulnerability, and work with the NOSC, Enterprise VAT, and enterprise networking teams to proactively block exploitation within the DHS environment
  • Conduct scheduled and ad-hoc vulnerability/compliance scanning
  • Create and maintain scans in support of continuous scanning requirements for various FISMA systems
  • Employ ad-hoc or emergency vulnerability/compliance scanning to support targeted incident investigation, escalation, and emergency response to security events in accordance with documented procedures
  • Coordinate with NOSC cybersecurity leadership and FISMA system ISSOs and system owners to explain findings, provide recommendations on mitigations, and advocate for mitigation of vulnerabilities
  • Track and trend vulnerabilities for HQ NOSC to assess and depict risk posture
  • Correlate CISA KVEs and incorporate into NOSC scanning as applicable
  • Conduct, operate, and maintain vulnerability/compliance assessments and the resulting data and reports
  • Conduct Host-based and Network Vulnerability Assessments
  • Conduct Database Vulnerability Assessments
  • Conduct Web-based Vulnerability Assessments
  • Author and maintain SOPs and runbooks
  • Other duties as assigned
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service