Vulnerability Researcher

Accenture Federal ServicesArlington, VA
13h

About The Position

The Vulnerability Researcher is responsible for identifying weaknesses in networks, systems, and software, and implementing measures to strengthen cybersecurity within the program. This role develops risk‑based mitigation strategies for networks, operating systems, and applications, and compiles and tracks vulnerabilities and remediation results to measure the effectiveness of the program’s security posture. The Vulnerability Researcher also creates and maintains vulnerability management policies, procedures, and training materials, and supports the review and definition of requirements for information security solutions. The position conducts network‑based scans to identify potential attack vectors and host‑based scans to detect vulnerabilities in workstations, servers, and other network hosts.

Requirements

  • Bachelor’s degree in Computer Science, Cybersecurity, Programming, or a related field; or 4 years additional equivalent work experience.
  • Minimum of 8 years of experience in vulnerability analysis or a related cybersecurity role.
  • Excellent understanding of network security architecture principles and the nature of system, application, and network‑based threats and vulnerabilities.
  • Experience with vulnerability assessment tools, scanning platforms, and security technologies.
  • Must be a US citizen (No Dual Citizenship)
  • Must possess an active Secret clearance

Nice To Haves

  • Certifications such as CompTIA CySA+, CompTIA Security+, or Certified Ethical Hacker (CEH).
  • Familiarity with enterprise IT environments, threat assessment tools, and vulnerability management frameworks.
  • Experience with risk analysis and enterprise vulnerability lifecycle management.
  • Strong analytical and problem‑solving skills with the ability to assess complex security issues and develop effective mitigation strategies.
  • Effective communication skills with the ability to produce clear technical documentation and reports.

Responsibilities

  • Detect vulnerabilities across networks, operating systems, applications, and software.
  • Develop risk‑based mitigation strategies to remediate or reduce exposure to identified weaknesses.
  • Compile, track, and report vulnerabilities and mitigation results to quantify program performance.
  • Create and maintain vulnerability management policies, standard operating procedures, workflows, and training content.
  • Review and define requirements for information security technologies and tools.
  • Conduct network‑based scans to identify potential security attack paths.
  • Perform host‑based scans of workstations, servers, and other network devices to identify vulnerabilities.
  • Use cybersecurity assessment tools and analysis techniques to evaluate threat exposure.
  • Analyze complex threats and develop actionable mitigation recommendations.
  • Support continuous improvement of the vulnerability management program.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service