About The Position

The Vulnerability Management Engineer- Mid supports SEC ISS contract objectives by identifying, prioritizing, and driving remediation of security vulnerabilities across enterprise infrastructure and cloud-connected environments. This role strengthens SEC risk posture by aligning vulnerability management activities with NIST and FISMA requirements, including support for audit readiness and continuous monitoring outcomes. The engineer works across operations, engineering, and system owner teams to reduce exposure through timely patching, hardening, and POA&M closure. This position also delivers clear reporting to leadership and contributes to incident response for vulnerability-related events.

Requirements

  • This position is restricted to U.S. citizens only. Applicants must not hold dual citizenship with any other country to be eligible for work under this contract.
  • The ability to obtain and maintain SEC Public Trust (or higher if required).
  • Bachelor's degree with 4+ years of experience in vulnerability management and remediation within enterprise IT environments.
  • Strong understanding of security frameworks, risk assessment methodologies, and compliance standards, including NIST and FISMA.
  • Experience coordinating remediation with system owners and technical teams, including vulnerability tracking and POA&M closure.
  • Strong analytical, problem-solving, and technical communication skills for mixed technical and business audiences.
  • Vulnerability scanning and assessment platforms (e.g., Tenable Nessus, Qualys, Rapid7).
  • Patch management processes, configuration baselines, and secure system hardening practices.
  • Knowledge of enterprise infrastructure, operating systems, and cloud environments.
  • Familiarity with automation scripts for vulnerability remediation and reporting.
  • Reporting and dashboard development for compliance and leadership visibility.

Nice To Haves

  • Experience supporting federal civilian agency environments with FISMA/RMF continuous monitoring requirements.
  • Demonstrated success reducing high-severity vulnerability backlog and improving closure timelines in large enterprises.
  • Experience integrating vulnerability management activities with SOC operations and incident response workflows.
  • Experience building automated remediation/reporting workflows using enterprise automation and analytics tools.
  • Advanced cybersecurity certification progression (e.g., CISSP, GIAC, or equivalent) beyond baseline requirements.
  • CompTIA Security+, CEH, CISSP Associate.

Responsibilities

  • Perform recurring vulnerability assessments across servers, endpoints, network devices, and relevant cloud-hosted assets using approved scanning tools.
  • Analyze scan results for severity, exploitability, asset criticality, and business impact to prioritize remediation actions.
  • Validate findings by identifying false positives, duplicates, and exceptions to maintain accurate risk data.
  • Maintain visibility of open vulnerabilities and aging risk across the enterprise environment.
  • Coordinate with system owners, engineering teams, and operations staff to execute timely remediation plans.
  • Track and manage Plans of Action and Milestones (POA&Ms) through resolution, including status updates and risk disposition.
  • Support patch management and secure configuration hardening activities aligned to approved baselines and SOPs.
  • Identify recurring root causes and recommend control improvements to reduce reintroduction of vulnerabilities.
  • Develop, maintain, and improve vulnerability management policies, procedures, and standard operating processes.
  • Support risk management and compliance efforts by producing documentation and artifacts for FISMA-related reviews and audits.
  • Ensure vulnerability and remediation activities are documented in approved ticketing/workflow systems in accordance with service management practices.
  • Collaborate with stakeholders to align vulnerability operations with contract governance, reporting cadence, and control objectives.
  • Generate dashboards and reports for leadership on vulnerability trends, remediation progress, POA&M status, and compliance posture.
  • Communicate technical findings and remediation priorities to both technical and non-technical stakeholders.
  • Support incident response activities tied to discovered or exploited vulnerabilities, including triage and cross-team coordination.
  • Provide metric-driven recommendations to improve continuous monitoring effectiveness and risk reduction outcomes.
  • May require participation in on-call or surge support activities depending on operational needs.

Benefits

  • competitive compensation
  • Health and Wellness programs
  • Income Protection
  • Paid Leave
  • Retirement
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service