Today
Secret
Mid Level Career (5+ yrs experience)
IT - Security
Beltsville, MD (On-Site/Office)
You will get to perform and do the following:
Vulnerability Scanning:
Perform regular vulnerability scans across the Department's systems and networks, identifying deviations from acceptable configurations and standards.
Evaluate and prioritize identified vulnerabilities based on potential impact and risk, and recommend remediation strategies and solutions.
Collaborate with system owners and administrators to address identified vulnerabilities and ensure timely remediation.
Compliance Scanning:
Execute enterprise-wide operating system and application compliance verification, assessing adherence to established security policies and best practices.
Develop security baseline configuration compliance and vulnerability scan policies for Department hosted operating system platforms (e.g., Windows, UNIX, Linux, Cisco, Juniper, etc.).
Prepare audit reports identifying technical and procedural findings, providing recommended remediation strategies and solutions.
Perform security authorization audits using NIST Risk Management Framework (RMF), NIST Cybersecurity Framework, and FISMA reporting criteria for security control testing procedures, and create the associated Security Assessment Reports.
Web Application Scanning:
Conduct web application vulnerability scanning to identify potential security risks and weaknesses in applications and services.
Collaborate with web developers and application owners to address identified vulnerabilities and ensure the implementation of secure coding practices.
Monitor emerging web application vulnerabilities and threats, and recommend appropriate mitigation strategies.
Database Scanning:
Perform database vulnerability scanning to identify potential security risks and weaknesses in database management systems and configurations.
Collaborate with database administrators to address identified vulnerabilities and ensure the implementation of secure database practices.
Monitor emerging database vulnerabilities and threats, and recommend appropriate mitigation strategies.
Qualifications
Minimum Requirements:
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or a related field, and a minimum of 9 years of experience in enterprise scanning, vulnerability management, or cybersecurity. An additional 4 years of experience may be substituted in lieu of degree.
Must have experience using Tenable software suite to perform vulnerability scanning, discovery scans, and baseline compliance scoring (experience in running and administering Tenable.SC and/or Tenable.IO to be able to take on architecture and tool development tasks).
To be considered for this position, you must either currently hold one of the professional certifications listed below or obtain one prior to their start date. Continued certification is required as a condition of employment:
CASP+ CE, CCNA Cyber Ops, CCNA-Security, CCNP Security, CEH, CFR, CISA, CISSP (or Associate), Cloud+, CySA+, GCED, GCIA, GCIH, GICSP, SCYBER, VCA DCV, PPDA, Agile IC, SNOW App Dev.
In-depth knowledge of vulnerability, compliance, web application, and database scanning methodologies and best practices.
Familiarity with various operating systems (Windows, UNIX, Linux, Cisco, Juniper, etc.).
Demonstated analytical and problem-solving skills, with the ability to identify and resolve complex security issues.
Demonstrated excellent communication and interpersonal skills, with the ability to work collaboratively with cross functional teams.
Vulnerability Scanning:
Perform regular vulnerability scans across the Department's systems and networks, identifying deviations from acceptable configurations and standards.
Evaluate and prioritize identified vulnerabilities based on potential impact and risk, and recommend remediation strategies and solutions.
Collaborate with system owners and administrators to address identified vulnerabilities and ensure timely remediation.
Compliance Scanning:
Execute enterprise-wide operating system and application compliance verification, assessing adherence to established security policies and best practices.
Develop security baseline configuration compliance and vulnerability scan policies for Department hosted operating system platforms (e.g., Windows, UNIX, Linux, Cisco, Juniper, etc.).
Prepare audit reports identifying technical and procedural findings, providing recommended remediation strategies and solutions.
Perform security authorization audits using NIST Risk Management Framework (RMF), NIST Cybersecurity Framework, and FISMA reporting criteria for security control testing procedures, and create the associated Security Assessment Reports.
Web Application Scanning:
Conduct web application vulnerability scanning to identify potential security risks and weaknesses in applications and services.
Collaborate with web developers and application owners to address identified vulnerabilities and ensure the implementation of secure coding practices.
Monitor emerging web application vulnerabilities and threats, and recommend appropriate mitigation strategies.
Database Scanning:
Perform database vulnerability scanning to identify potential security risks and weaknesses in database management systems and configurations.
Collaborate with database administrators to address identified vulnerabilities and ensure the implementation of secure database practices.
Monitor emerging database vulnerabilities and threats, and recommend appropriate mitigation strategies.
Qualifications
Minimum Requirements:
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or a related field, and a minimum of 9 years of experience in enterprise scanning, vulnerability management, or cybersecurity. An additional 4 years of experience may be substituted in lieu of degree.
Must have experience using Tenable software suite to perform vulnerability scanning, discovery scans, and baseline compliance scoring (experience in running and administering Tenable.SC and/or Tenable.IO to be able to take on architecture and tool development tasks).
To be considered for this position, you must either currently hold one of the professional certifications listed below or obtain one prior to their start date. Continued certification is required as a condition of employment:
CASP+ CE, CCNA Cyber Ops, CCNA-Security, CCNP Security, CEH, CFR, CISA, CISSP (or Associate), Cloud+, CySA+, GCED, GCIA, GCIH, GICSP, SCYBER, VCA DCV, PPDA, Agile IC, SNOW App Dev.
In-depth knowledge of vulnerability, compliance, web application, and database scanning methodologies and best practices.
Familiarity with various operating systems (Windows, UNIX, Linux, Cisco, Juniper, etc.).
Demonstated analytical and problem-solving skills, with the ability to identify and resolve complex security issues.
Demonstrated excellent communication and interpersonal skills, with the ability to work collaboratively with cross functional teams.
group id: 10176392