Defensive Cyber Operations (DCO) Analyst

Fort Eisenhower, GA

Redhorse

We’ve all been on your side of the table at some point in our careers, in uniform or government. That experience helps us understand your challenges in a…

View all jobs at Redhorse

Apply now Apply later

About the Organization Now is a great time to join Redhorse Corporation. Redhorse specializes in developing and implementing creative strategies and solutions with private, state, and federal customers in the areas of cultural and environmental resources services, climate and energy change, information technology, and intelligence services. We are hiring creative, motivated, and talented people with a passion for doing what's right, what's smart, and what works.
Position Description Redhorse is seeking a Defensive Cyber Operations (DCO) Analyst (Vulnerability Scanning) to support GISA at Fort Eisenhower, GA. The successful candidate will have familiarity with relevant regulations and compliance standards, particularly those pertaining to vulnerability scanning in the Army and IC environment with expert knowledge of the DISA ACAS Best Practice Guide.

Responsibilities:

  • Perform regular vulnerability assessments and scanning of network, systems, and applications on both on premise and cloud environment to identify security weaknesses and potential threats using Tenable Nessus.
  • Analyze the results of vulnerability scans to determine the level of risk associated with identified vulnerabilities.
  • Collaborate with IT and security teams to develop plans for mitigating or remediating vulnerabilities, which may include patch management, configuration changes, or other security measures.
  • Manage and maintain vulnerability scanning tools and software, ensuring they are up-to-date and effective in identifying vulnerabilities.
  • Participate in or support incident response activities by providing expertise in vulnerability-related issues during security incidents.
  • Create detailed reports on vulnerability scan results, risk assessments, and mitigation progress to share with relevant stakeholders, including management and regulatory bodies.
  • Ensure compliance with industry standards and regulations related to vulnerability scanning and reporting, such as DOD, Army and Intelligence Community (IC) task orders, bulletins, National Security Memorandums (NSM) and the ACAS DISA Best Practice Guide.
  • Educate and train ISSO and ISSM personal across the Army Intelligence Enterprise (AIE) on the importance of vulnerability scanning and security best practices.
  • Continuously monitor systems and networks for emerging threats and vulnerabilities, adapting scanning and assessment processes as needed to remain complaint with Army and IC regulations.
  • Stay current with the latest cybersecurity threats and technologies, contributing to the development of improved vulnerability scanning methodologies and tools.
  • Familiarity with relevant regulations and compliance standards, particularly those pertaining to vulnerability scanning in the Army and IC environment with expert knowledge of the DISA ACAS Best Practice Guide.

Basic Minimum Requirements for Skills, Experience, Education and Credentials include:

  • Active TS security clearance and eligible for SCI and NATO read-on prior to starting work
  • A bachelor's degree in computer science, information technology, cybersecurity, or a related field.
  • Meet the DoD requirements for a privileged user on a TS/SCI information system prior to starting work - DoD 8140 / 8570.01-m requirements.
  • Industry certifications such as Certified Information Systems Security  Professional (CISSP), Certified Information Security Manager (CISM), or Certified Ethical Hacker (CEH).
  • Proficiency in vulnerability scanning and cyber tools such as Nessus, Splunk, network analyzers, Big Data Platform and analytics, as well as knowledge of related tools and technologies.
  • Strong understanding of cybersecurity principles, threat landscape, and common vulnerabilities and exposures (CVEs).
  • The ability to analyze and interpret vulnerability scan results and make informed decisions regarding risk and remediation.
  • Strong written and verbal communication skills for creating reports, conveying information to non-technical stakeholders, and collaborating with other teams.
  • The capability to identify and resolve security issues efficiently.
  • Thoroughness in scanning, analyzing, and documenting vulnerabilities and their potential impact.
  • Collaboration and teamwork skills, work closely with IT and security teams to address vulnerabilities.
Equal Opportunity Employer/Veterans/Disabled  Accommodations:If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation if you are unable or limited in your ability to access job openings or apply for a job on this site as a result of your disability. You can request reasonable accommodations by contacting Talent Acquisition at Talent_Acquisition@redhorsecorp.com Redhorse Corporation shall, in its discretion, modify or adjust the position to meet Redhorse’s changing needs.This job description is not a contract and may be adjusted as deemed appropriate in Redhorse’s sole discretion.
Apply now Apply later
  • Share this job via
  • 𝕏
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  3  0  0

Tags: ACAS Analytics Big Data CEH CISM CISSP Clearance Cloud Compliance Computer Science DCO DISA DoD DoDD 8140 DoDD 8570 Incident response NATO Nessus NSM Risk assessment Security Clearance Splunk TS/SCI Vulnerabilities Vulnerability scans

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.