Fayetteville, North Carolina, Kuwait
1 day ago
Vulnerability Analyst I
Overview Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism. As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems. Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks. Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program! You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position. Responsibilities Conduct regular security assessments and audits of information systems with the DoD SWA network. Develop and implement action plans to manage common vulnerabilities and exposures. Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating. Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN. Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities. Recommend improvements to the overall cybersecurity posture. Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently. Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON. Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues. Additional requirements may vary depending upon location. Perform any additional duties as required/assigned. Qualifications Qualifications Security Clearance: Requires an active Secret Clearance Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required. Bachelor’s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field. This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: IAT Level: IT II / IAT III BASELINE: Cisco: CCNP: Certified Network Professional - Security CompTIA: CASP+ ce: Advanced Security Practitioner GIAC: GCED: Certified Enterprise Defender GIAC: GCIH: Certified Incident Handler ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Certified Cloud Security Professional ISC2: CISSP (or Associate): Certified Information Systems Security Professional ISC2: CCSP: Certified Cloud Security Professional COMPUTING ENVIRONMENT (CE): Cisco: CCIE: Certified Internetwork Expert (Any) Cisco: CCNP: Certified Network Professional (Any) EC Council: CEH: Certified Ethical Hacker EC Council: ECIH: Certified Incident Handler EC-Council: CHFI: Certified Hacking Forensic Investigator EC-Council: CND: Certified Network Defender GIAC: GCIH: Certified Incident Handler Microsoft: 365 Certified: Enterprise Administrator Expert Microsoft: Certified: Azure Associate (Any) Microsoft: Certified: Azure Expert (Any) Microsoft: MCSE: (Any above 2012) Red Hat: RHCA: Certified Architect Red Hat: RHCE: Certified Engineer Red Hat: RHSA: Certified Systems Administrator Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience. Requires a minimum of seven (7) years of experience in telecommunications sector. We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity /Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/Female/Disabled/Veteran.
Confirm your E-mail: Send Email