The Job Network
Search

Cyber Vulnerability Engineer

companyITR
locationOak Ridge, TN, USA
PublishedPublished: 6/14/2022
Full Time

Job Description

East Tennessee company is seeking a Cyber Vulnerability Engineer to join their growing team. This position will require candidates to come onsite and work in a hybrid role. Candidates must be able to obtain a federal security clearance so US citizenship will be required.
Primary Responsibilities:

  1. Provide technical advice and identify cyber security areas in need of improvement, including operational as well as research capabilities
  2. Manage, enhance, and maintain Vulnerability scanning infrastructure and program
  3. Collaborate with Cyber Operations, Cyber Governance, Networking, Enterprise Operations, Cyber Security Research, and other groups across the Laboratory to ensure appropriate configuration and implementation of security tools
  4. Standardize, document, maintain, and automate the network and cyber processes for monitoring, analyzing, and responding to events
  5. Prepare assessments, develop dashboards, document results, and provide status reports and recommendations to the Cyber Security Group Leaders, CISO, and IT management

Basic Qualifications:

  1. Bachelor's Degree in Computer Science or related field or combination of experience and education will be considered for exceptionally technically proficient candidates
  2. Minimum 5-7 years of experience in Cyber Security, specifically cyber engineering and system administration
    1. Experience managing and implementing Vulnerability Scanning tools Such as Nessus, Burp Suite, Nexpose, Nmap
  3. Experience with Hadoop, Accumulo, Elastic Stack, Spark, and/or related technologies
  4. Experience planning, designing, and implementing cyber security improvements and associated metrics to assess impact
  5. Extensive knowledge of information technology and cyber security topics, including network flow, log analysis, cyber security visualization, and programming
  6. Ability to perform log-centric analysis (application logs, operating system events, authentication data, etc.)
  7. Possess strong analytical skills - able to efficiently evaluate data sources and communicate analyses effectively
  8. Able to communicate effectively at all levels of an organization
  9. Ability to work in a fast-paced, enterprise environment
  10. Demonstrated ability to work in a team environment, able to coach and mentor other team members
  11. Must provide outstanding customer support and possess the ability to work well with peer security professionals, researchers, system administrators, desktop support specialists, and help desk specialists
  12. A highly motivated individual who strives for excellence and will drive success regardless of obstacles

Preferred Qualifications:

  1. Comprehensive understanding of cyber threat actors and their corresponding methods/tactics
  2. Advanced understanding of Linux, Unix, Mac and Windows operating systems
  3. Experience with business strategy, improving processes, and making recommendations in business processes and policies for operational metrics and results
  4. Effective at communicating clearly to technical and business audiences
  5. Experience working in large scale (> 5000) employee research environments
Loading interface...
Loading interface...
Loading interface...
Loading interface...
Loading interface...
Loading interface...