Cyber Command Vulnerability Management Specialist 3

Overview

On Site
$DOE
Accepts corp to corp applications
Contract - W2
Contract - Independent
Contract - Long Term

Skills

Python
Cybersecurity
including vulnerability management scanning tools
CVEs
CVSS
Vector Strings
NVD
Mitre
attack vectors and mitigations
Rapid7
Power Shell

Job Details

Role : Cyber Command Vulnerability Management Specialist 3

Location: Brooklyn, NY 11201

Duration: Long Term

Project Description:

The Threat Management - Vulnerability Management Specialist MWBE is essential to OTI Cyber Commands Vulnerability Management program and its ability to defend City systems from cyber threat including direct support of public safety, revenue generating, and City operations that provide everyday services to citizens.

The resource will contribute to OTI Cyber Command's ability to issue timely vulnerability notifications and prioritized system patching info. Without timely vulnerability notification and patching, the City cannot effectively adjust its defensive controls and reduce it's attack surface resulting in the increased likelihood of cyber events that may require costly remediation efforts.

SCOPE OF SERVICES

The Cyber Command Threat Management division within OTI requires a Vulnerability Management Specialist to serve as a subject matter expert for vulnerability management:

Tasks

Research, analyze and brief management and team members on relevant Risk, CVE's, CVSS, Vector Strings, NVD, Mitre, attack vectors and mitigations for various technologies

Design, architect and build Rapid7 vulnerability management scanning infrastructure and tools

Manage, configure and conduct Vulnerability Management scans in Rapid7 across various networks

Conduct vulnerability management analysis through industry research, deep analysis, generating of reports and dashboards in Rapid7 to accurately assess and prioritize risk

Evaluate security vulnerabilities, assess risk and impact, develop mitigation strategies, and implement remediation

Present succinct technical briefings to team members and customers for intel research, risk assessment, CVE's, vendor hardware/software, industry trends

Create scripts utilizing Python, PowerShell and others to automate vulnerability management tasks

The ability to automate detection, reporting and tracking of vulnerabilities identified

Create deep analysis and reports around vulnerability management utilizing Rapid7 dashboards and reports, scripts, Excel and PowerPoint

Travel within NYC for various projects when necessary

Required Skills:

At least 8 years of experience in Cybersecurity, including vulnerability management scanning tools, vulnerability assessments, attack surface management, scripting, vulnerability intel analysis, vulnerability management scan result analysis, Excel

Strong knowledge of CVE's, CVSS, Vector Strings, NVD, Mitre, attack vectors and mitigations

Experience with the design, architect and build of vulnerability management scanning infrastructure and tools specifically Rapid7; extensive hands-on experience conducting Rapid7 vulnerability scans across various networks; experience conducting Rapid7 vulnerability management analysis through reports and dashboards to accurately identify risk

Experience evaluating security vulnerabilities, assessing risk and impact, developing mitigation strategies, and implementing remediation

Experience conducting intel research around CVE's, vendor hardware/software vulnerabilities, and presenting succinct technical overviews to team members and customers

Extensive experience with scripting such as Python and PowerShell to automate vulnerability management tasks

Extensive experience with Excel, especially for performing data analysis through VLookup and Pivot Tables

Preferred Skills:

Provide oral and written reports on vulnerability risk to the team and possibly agencies' technical stakeholders

Ability to evaluate the current threat landscape that includes tactics, techniques and procedures

Work with agencies to evangelize the OTI Cyber Command program around areas of cybersecurity posture enhancement, risk reduction, attack surface management, vulnerability management scanning tool performance, scan results, credentialed scans, triage scan performance issues, socialize risk and remediation, and other vulnerability management issues

Experience using Tableau for reporting and analysis purposes

Strong background with next generation firewall products, intrusion detection systems, DMZ, IPSec, DNS, SMTP, HTTP, VPN, proxies, etc.

Knowledge of security best practices across multiple platforms, such as Microsoft Windows, VMWare, Linux, VPN, Cisco IOS, and Mobile OS Android/Apple IOS.

Knowledge of public-key cryptography, understanding of encoding, encryption, and hashing techniques

Knowledge of security best practices: NIST, CIS, Cisco, Juniper, Palo Alto, Fortinet, Checkpoint, F5, Microsoft, Unix/Linux, etc.

Ability to analyze Cybersecurity documentation, including security policies, plans, and procedures.

Extensive experience with Windows and Linux Servers

Exceptional written and oral communication skills

Exceptional organizational and analytical skills

Certifications such as Certified Information Systems Security Professional (CISSP) Certification, Security Essentials Certification (GSEC), Certified Intrusion Analyst (GCIA), Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), Certified Penetration Tester (CWAPT)

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.