Jr. Vulnerability Assessment Analyst
Crownsville, MD, United States
Integres, LLC
Integres, LLC provides the personal engagement of a small company with the expertise of a large company. Experience the benefits of expert and personalized execution of Agile Scrum, DevOps, Human-Centered Design, Software Development and IT...Company Description
Integres, LLC is a Service-Disabled Veteran Owned Small Business (SDVOSB) which was established to provide high quality, insightful, agile information technology-based solutions to its customers. Integrity is a foundational element of everything we strive to do. We seek to develop solutions which respond to the evolving challenges that today’s organizations face using our own unique combination of industry best practices, and evolving techniques and technologies. We started Integres with the intent of building "a company with a soul". As such, we take a servant-leadership approach as the long-term strategy for our success. We are cultivating a corporate family culture which demands excellence and accountability while putting a premium on work/life balance. We empower and support our employees to contribute to achieving our corporate goals by interacting with our customers as true partners, rather than treating their engagement as just another job. We seek to be good corporate citizens and encourage and promote employee participation in community and volunteer work.
Job Description
We are looking for a Jr. Vulnerability Assessment Analyst with project lead experience and hands-on engineering experience. The Vulnerability Assessment Analyst will be responsible for the planning, implementation, maintenance, and support of the vulnerability management program for a state-level department of IT, Security Assessment Function.
Duties and Responsibilities:
- Daily oversight of vulnerability management program
- Serve as liaison between Security Assessment and Security Operation Center (SOC) functions on matters pertaining to vulnerability scanning for security assessment efforts
- Plan, execute, monitor, control, and successfully close vulnerability management projects/tasks
- Configure and schedule patch and secure configurations audit scan jobs (vulnerability scans)
- Maintain configurations of patch and secure configurations scan jobs, i.e., asset lists, scan plugins, STIGs audit files, CIS Benchmarks audit files, and scan credentials
- Troubleshoot and resolve failed patch and secure configurations scan jobs, i.e., missing credentials, asset list updates, firewall issues
- Analyze patch and secure configurations audit scan results and identify and document technical and procedural vulnerability findings
- Research resolution strategies/measures for identified vulnerability findings and provide remediation/mitigation recommendations
- Identify false positive findings and determine and advise on the criteria for validating the findings i.e., required artifacts
- Prepare vulnerability management reports on the status of patch and secure configuration audit scans and associated remediation efforts
- Communicate status vulnerability management efforts to include regular scheduled reports and as well as ad hoc reports
- Ensure the vulnerability management platform maintains updated versions of secure configurations scans audit files i.e., proprietary vendor audit files, STIGs audit files, CIS Benchmarks audit files
- Ensure that vulnerability management services are operating as expected i.e., completeness of the of each scope scan jobs, timely completion of scan jobs, up-to-date patch audit plugins
- Ensure proper functioning of integrations between the vulnerability management platform and other tools such as asset management and risk management platforms
- Ensure and data updates from vulnerability management platforms to asset management and risk management platform are running as scheduled
- Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
- Development and implementation operational and technical vulnerability management policies
- Defining, developing, implementing, and processes and procedures for to support and maintain vulnerability management program
Qualifications
Education and Years of Experience:
- At least five (5) years of experience with NIST Risk Management Framework (RMF) supporting technical assessment (vulnerability scans) of control implementations and continuous monitoring post-system Authority to Operate (ATO)
- At least three (3) years of hands-on experience in LAN Administration i.e., Hands-on administration of Windows OS and Linux OS, and hands-on basics administration of routers, switches, and firewalls.
- At least ftwo (2) years of hands-on experience with Tenable Security Center/ Nessus Scanners i.e., creating, maintaining, and running scan jobs and analyzing scan results
- At least two (2) years of hands-on experience executing, monitoring and controlling, and closing security assessment projects
- Associates or bachelor’s degree from an accredited college or university with a major in Computer Science, Information Systems, Engineering or related scientific or technical discipline.
- Ability to work outside of regular business hours, the role may require on-call support after regular business hours or weekends.
Required Skills/Certifications:
- At least 1 security management industry certifications such as Sec+, CySA+, etc.
- Self-starter, able to gather requirements, plan, execute system deployment efforts.
- Able to perform conduct vulnerability assessment of technical security controls, identify and validate findings, research resolutions, and provide remediation/mitigation recommendations.
- LAN administration experience, particularly with Windows OS and Linux OS.
- Experience with the vulnerability management tools such as Tenable Security Center/Nessus Scanners, Web Inspect, DB Protect etc.
- Experience with Governance, Risk, and Compliance (GRC) platforms such as RSA Archer, ServiceNow GRC, CSAM
- Customer-oriented with excellent issue follow-through and resolution abilities.
- Excellent written and oral communication, and presentation skills.
- Ability to effectively work both autonomously as well as on a team.
- Outstanding interpersonal skills, strong work ethic, and self-motivated.
- Utilize tools and analytical skills to plan and execute technical changes.
- Relevant industry certification.
Additional Information
Integres offers competitive salaries bolstered by a comprehensive benefits package, which provides safety and security for our employees and their families. Our generous benefits package includes:
- Healthcare and Insurance: medical, dental, vision, short and long-term disability protection, basic life and AD&D insurance
- 401(k) Savings Plan
- Accrued Paid Time Off (PTO)
- Employee Recognition and Rewards
- Employee Referral Bonuses
Integres is an equal opportunity affirmative-action employer. We encourage Minority/Female/Protected Veteran/Disabled applicants to apply. Integres, LLC proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment because of race, color, sex, religion, age, sexual orientation, gender identity and expression, national origin, marital status, physical or mental disability, status as a Disabled Veteran, Recently Separated Veteran, Active Duty Wartime, or Campaign Badge Veteran, Armed Forces services Medal, or any other characteristic protected by law.
All your information will be kept confidential according to EEO guidelines.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Agile Audits Compliance Computer Science Cyber defense Firewalls Governance Linux Monitoring Nessus NIST Risk management RMF RSA Security assessment SOC STIGs Strategy Vulnerability management Vulnerability scans Windows
Perks/benefits: Health care Insurance
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.