Search

Vulnerability Management Analyst

TEKsystems
locationFort Meade, MD, USA
PublishedPublished: 6/14/2022
Real Estate
Full Time

Job Description

Job Description

Great Opportunity to join a major Cyber Initiative in Fort Meade!!

Top Three Skills:

1) Must have experience with Identity Access Management (specific tools the customer is seeking are ArcSight, Splunk, PCAP, Jims, or tools similar)
2) Experience and Knowledge of network defense operations
3) Basic understanding of networking communication using protocols

Must have a current Top Secret/SCI Clearance.


Job Summary
The selected candidate shall support the analysis of software/hardware vulnerabilities and the impact those vulnerabilities will have to DoD systems. Utilize this expertise to identify priority level for vulnerability fix actions and contribute to the mitigation strategies that can be implemented prior to the release of a vendor fix action. Understand the lifecycle of the network threats, attack vectors and methods of exploitation. Have specialized knowledge in computer network theory and understand IT standards, including the OSI model, and the methods of exploiting those standards.

Primary Responsibilities
• Establish communications with vendors for the release of newly identified vulnerabilities and to ensure they understand the specialized requirements of DoD information systems.
• Leverage a specialized understanding of vendor products and fix actions to develop mitigation's orders for the identified vulnerabilities.
• Compile daily, weekly and annual vulnerability metrics associated with affected and non-affected DoD products.
• Utilize tracking tools to upload information for DoD component consumption and vulnerability compliance tracking.
• Create situational awareness products to provide DoD components with detailed information related to vulnerabilities and appropriate mitigation strategies.
• Identify, analyze, and develop mitigation or remediation actions for system and network vulnerabilities.
• Prioritize identified vulnerabilities based upon severity, potential operational impact, and other factors for DoD.
• Conduct open source research to identify and analyze known and unknown vulnerabilities.
• Analyze issues affecting DoD components with vendor provided fixes and contact the appropriate vendor for a defined and attainable solution.
• Conduct coordination with DISA/FSO, DoD CC/S/A/FA, Intelligence Agencies, LE, US Government organizations.
• Provide notification of potential threats by tracking vulnerabilities and exploits, propagation of worms and viruses as they migrate throughout DoD and globally.
• Develop, document, and convey IAVM operational requirements to enhance capabilities to identify, track, and remediate system and network vulnerabilities as well as for a real-time patch management capability.
• Monitor the progress of internal and external organizations to ensure IAVM operational requirements are fulfilled for Government review.

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...