Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems, and collects, investigates and reports any suspected and confirmed security violations.
The CBP SOC Program has a critical need for a Tier 1 Vulnerability Assessor (VAT) to join our team.
This position will provide Vulnerability Assessment support to the United States Department of Homeland Security, focused on performing vulnerability scans of enterprise IT assets utilizing the approved scanning infrastructure. Additional responsibilities include performing research and analyzing current threats and vulnerabilities that may affect the enterprise, writing security advisories, and participating as team member performing focused adversarial assessments.
Primary responsibilities include:
- Perform research on current threats and vulnerabilities
- Author security advisories
- Manage enterprise vulnerability compliance
- Conduct vulnerability assessments of IT systems
- Other duties as assigned
Must currently possess or be able to obtain a DHS EOD and have a DoD Secret Clearance.
Bachelors Degree in IT or related field and 2 years of related experience.
Familiar with the management, operational, and technical aspects of IT Security in a complex enterprise environment.
Experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, experience configuring and implementing various technical security solutions, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices.
Experience in cyber government, and/or federal law enforcement. Experience with Cyber Kill Chain. Experience in cyber government, and/or federal law enforcement.