GermantownRecruiter Since 2001
the smart solution for Germantown jobs

Cybersecurity Vulnerability Engineer

Company: Leidos
Location: Herndon
Posted on: August 7, 2022

Job Description:

DescriptionJob Description:The primary mission of the United States Mint (Bureau under United States Department of Treasury) is to serve the American people by manufacturing and distributing circulating, precious metal and collectible coins and national medals, and providing security over assets entrusted to us.Its cyber security program is one of the United States Mint s critical needs and one of the most pressing priorities for the bureau s Information Technology Department (ITD). The Information Technology Department is responsible for securing not only standard information technology infrastructure, but also an Industrial Control System (ICS)/Supervisory Control and Data Acquisition (SCADA) infrastructure. ISD is responsible for maintaining regulations and requirements governing federal IT security, addressing the increasing frequency and sophistication of cyber-attacks, and supporting an overarching effort of continuous organizational improvement and maturity. ITD maintains a continuous monitoring policy and a heightened focus on cyber security compliance and operations.The Leidos USMINT SOC Program has a current need for a Vulnerability Analyst. The Vulnerability Analyst will be responsible for discovering cybersecurity risks, prioritizing assets, and utilizing remediation/mitigation techniques. This role will serve as one of the focal points to support the bureau s efforts to reduce vulnerabilities, drive and track remediation and mitigation, and foster an environment of risk management to prioritize and tackle threats to business problems.Primary Responsibilities:Tactically guide the Vulnerability Management (VM) Plan, to coordinate, monitor and support activities in the areas of the VM program, security patch and remediation managementProvide status reports to CISO and ISD Branch Chiefs related to VM metrics, key risk indicators, trending, and compliance reports to the CISO, ISD leadership, and ITD system ownersPerform information system security vulnerability scans to discover and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system componentsPerform compliance scans to analyze configurations and facilitate implementation of configurations and hardening settings for networks, operating systems, applications, databases, and other information system componentsEngage with ITD VM stakeholders, to include ITD systems owners, ITD management, and auditors, to facilitate vulnerability discovery and remediationValidate remedial actions and ensure compliance with information security policy and regulatory requirementsUse automated tools (e.g. Nessus) to pinpoint vulnerabilities and reduce time-consuming tasksUse manual testing techniques and methods to gain a better understanding of the environment and reduce false negatives Develop, test and modify custom scripts and applications for vulnerability testingFacilitate and coordinate vulnerability assessment and scans, reviews of assessment results, patching, and remediation activities related to workstations, servers, storage, databases, appliances, web applications and network devicesAnalyze assessment results and threat feeds to properly react to security weaknesses or vulnerabilitiesPerform ad-hoc data manipulations, clean-ups, and reporting using large complex data sets for rapid security responses.Develop reports using data that is hosted in multiple sources/tools (e.g. spreadsheets, databases) and communicate clearly to leadership and other cyber teamsPropose VM concepts/solutions and prepare presentationsDevelop risk-based mitigation strategies for our client's networks, operating systems, and applicationsCompile and track vulnerabilities and mitigation results to quantify program effectiveness for metrics purposesReview and define requirements for information security solutions and document security breaches and the extent of the damage caused by the breaches through extensive reportsBasic Qualifications:Ability to continuously research emerging threats to the environment to disseminate the information to all stakeholders, immediately assess the known environment for presence of the vulnerability, and work with the enterprise networking teams to proactively block exploitation within the environment.Proficient in vulnerability scanning, tracking and remediation techniques.Conducts, operates, and maintains assessments and the resulting Vulnerability Assessment (VA) data and reportsConducts Host-based and Network Vulnerability Assessments on a wide variety of endpoints to include ICS/OT, Database and Web based applications.At least 6 years of experience in Vulnerability AnalysisAt least 6 years of experience querying, analyzing and working with vulnerability dataAt least 6 years of experience working with Vulnerability scanning, reporting, and Network tools (Nessus, SecurityCenter, Qualys, NMAP)Familiarity of Threat Classification and CVEFirm understanding of network security controls and network and infrastructureNetwork Devices and RoutingCloud ServicesKnowledge in system security architecture and security solutionsKnowledge in networking, phishing, and endpoint securityProven analytical and problem-solving skillsSelf-motivated to improve knowledge and skillsWorks well both in a team environment and independentlyCISSP preferred or an industry acknowledged security certificationAbility to obtain Public Trust clearanceEducation & Experience:Requires BS degree with 8+ years of prior relevant work experience within IT/Cybersecurity.Pay Range:Pay Range $94,250.00 - $145,000.00 - $195,750.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Keywords: Leidos, Germantown , Cybersecurity Vulnerability Engineer, Accounting, Auditing , Herndon, Maryland

Click here to apply!

Didn't find what you're looking for? Search again!

I'm looking for
in category

Log In or Create An Account

Get the latest Maryland jobs by following @recnetMD on Twitter!

Germantown RSS job feeds