Vulnerability Management Analyst

Remote in Crownsville, MD, US • Posted 1 hour ago • Updated 1 hour ago
Contract Independent
12 Months
Occasional Travel Required
On-site
Depends on Experience
Fitment

Dice Job Match Score™

✨ Finding the perfect fit...

Job Details

Skills

  • Web Applications
  • Vulnerability Management
  • Vulnerability Scanning
  • Regulatory Compliance
  • Risk Management
  • Risk Management Framework
  • Routers
  • SAP GRC
  • STIG
  • Security Analysis
  • Security Controls
  • Security Management
  • Security+
  • ServiceNow
  • Switches
  • System Administration
  • System On A Chip
  • Technical Analysis
  • Vulnerability Assessment
  • Asset Management
  • Auditing
  • CISA
  • CISM
  • CISSP
  • Certified Ethical Hacker
  • Computer Science
  • Continuous Monitoring
  • Database
  • EMC RSA Archer
  • Estimating
  • Firewall
  • INSPECT
  • IO
  • ISACA
  • IT Security Assessment
  • Information Systems
  • Nessus
  • Network Administration
  • RSA
  • Linux
  • Market Research
  • Microsoft Windows
  • RMF
  • Research

Summary

Vulnerability Management Analyst

 

Client: State of Maryland

POP: 12 weeks

Location: Remote, must be able to commute to Crownsville, MD



SCOPE

The Sr. Vulnerability Management Analyst will be responsible for the planning, implementation, maintenance, and support of the vulnerability management program for a State-Level Department of IT, Security Assessment Function.

 

REQUIRED SKILLS

  • Associates or bachelor’s degree from an accredited college or university with a major in Computer Science, Information Systems, Engineering or related scientific or technical discipline.

  • At least 1 security management industry certifications such as CISSP, CISM, CISA, CRISC etc.

  • At least twelve (12) years of experience with NIST Risk Management Framework (RMF) supporting technical assessment (vulnerability scans) of control implementations and continuous monitoring post-system Authority to Operate (ATO)

  • At least ten (10) years of hands-on experience in LAN Administration i.e., Hands-on administration of Windows OS and Linux OS, and hands-on basics administration of routers, switches, and firewalls.

  • At least five (5) years of hands-on experience with Tenable Security Center/ Nessus Scanners i.e., creating, maintaining, and running scan jobs and analyzing scan results

  • At least five (5) years of hands-on experience planning, executing, monitoring and controlling, and closing security assessment projects

  • Ability to work outside of regular business hours, the role may require on-call support after regular business hours or weekends.

  • Able to conduct vulnerability assessment of technical security controls, identify and validate findings, research resolutions, and provide remediation/mitigation recommendations.

  • Experience with the vulnerability management tools such as Tenable One, Security Center/Nessus Scanners, Tenable.io, Web Inspect, DB Protect etc.

  • LAN administration experience, particularly with Windows OS and Linux OS.

  • Experience with the vulnerability management tools such as Tenable Security Center/Nessus Scanners, Web Inspect, DB Protect etc.

  • Experience with Governance, Risk, and Compliance (GRC) platforms such as RSA Archer, ServiceNow GRC, CSAM




PREFERRED SKILLS

  • Experience with the vulnerability management tools such as Tenable One, Security Center/Nessus Scanners, Tenable.io, Web Inspect, DB Protect etc.

  • Experience with ServiceNow Vulnerability Response and Governance, Risk, and Compliance (GRC) modules.

  • Experience with Window, Linux, Database, and Web Apps system administration.

  • Experience in project task technical analysis, planning, and estimation.

  • Experience with technology capabilities market research, technical analysis/review, and recommendation.

  • Other relevant industry certifications such as Security +, CAP, CEH etc.

 

TASKS

  • Daily oversight of vulnerability management program

  • Serve as liaison between Security Assessment and Security Operation Center (SOC) functions on matters pertaining to vulnerability scanning for security assessment efforts

  • Plan, execute, monitor and control, and successfully close vulnerability management projects/tasks

  • Configure and schedule patch and secure configurations audit scan jobs (vulnerability scans)

  • Maintain configurations of patch and secure configurations scan jobs i.e., asset lists, scan plugins, STIGs audit files, CIS Benchmarks audit files, scan credentials

  • Troubleshoot and resolve failed patch and secure configurations scan jobs i.e., missing credentials, asset list updates, firewall issues

  • Analyze patch and secure configurations audit scan results and identify and document technical and procedural vulnerability findings

  • Research resolution strategies/measures for identified vulnerability findings and provide remediation/mitigation recommendations

  • Identify false positive findings and determine and advise on the criteria for validating the findings i.e., required artifacts

  • Prepare vulnerability management reports on the status of patch and secure configuration audit scans and associated remediation efforts

  • Communicate status vulnerability management efforts to include regular scheduled reports and as well as ad hoc reports

  • Ensure the vulnerability management platform maintains updated versions of secure configurations scans audit files i.e., proprietary vendor audit files, STIGs audit files, CIS Benchmarks audit files

  • Ensure that vulnerability management services are operating as expected i.e., completeness of the of each scope scan jobs, timely completion of scan jobs, up-to-date patch audit plugins

  • Ensure proper functioning of integrations between the vulnerability management platform and other tools such as asset management and risk management platforms

  • Ensure and data updates from vulnerability management platforms to asset management and risk management platform are running as scheduled

  • Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.

  • Development and implementation operational and technical vulnerability management policies

  • Defining, developing, implementing, and processes and procedures for to support and maintain vulnerability management program

 

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: RTX1dbb95
  • Position Id: 8974793
  • Posted 1 hour ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Fort Meade, Maryland

3d ago

Easy Apply

Full-time, Contract

Hybrid in Crownsville, Maryland

Today

Easy Apply

Contract, Third Party

130000

Washington, District of Columbia

Today

Easy Apply

Third Party, Contract

Crownsville, Maryland

Today

Contract, Third Party

Depends on Experience

Search all similar jobs