Vulnerability and Application Scanning Lead

4 months ago


Fort Knox, United States Bravura Information Technology Systems, Inc Full time

Role: Vulnerability and Application Scanning Lead

Location: Fort Knox, KY OR Remote Work

Education/Certifications: MA/MS preferred; Security+; IAT Level III certifications; Computing Environment Certifications

Years of Experience: 10+

ClearanceLevel & Investigation: Secret

IA Cert Level (DoD 8570.01): IAT Level III (CISSP, GASP+, GCED, or GCIH recommended)

Computing Environment Certifications: Required

JobDescription:

Qualifications:

  • Serves as Vulnerability and Application Scanning Lead with experience in performing correlation and scanning of application code (Java, .Net, etc.) with Government provided tools and other prescribed Cybersecurity tools to analyze risk and assess compliance across all systems, applications, and authorization boundaries.
  • Provides mitigation and remediation strategies to application developers to address vulnerabilities in code.
  • Uses current information security technology disciplines and practices to ensure the confidentiality, integrity, and availability of corporate information assets in accordance with established standards and procedures.
  • Develops and maintains knowledgebase on changing regulatory, threat, and technology landscapes to continually develop or maintain security policies and standards, and ensure compliance throughout the organization.

Specific Responsibilities:

  • Support execution of contract transition to ensure minimum service disruption to vital business and no service degradation during and after transition; ensure continuity of services while helping onboard personnel and jointly inventory intellectual and real property.
  • Perform enterprise-wide risk analysis and vulnerability assessments to assess the command security posture.
  • Coordinates and develops recommendations on Cybersecurity incident response, mitigation, remediation actions, or risk determination to protect command information systems from damage, destruction, or alteration IAW all required regulations and directives.
  • Performs scans of all static code across all Customer systems and applications with the Government-approved tool.
  • Complies with statutory and regulatory requirements supporting boundary authorizations IAW RMF.
  • Delivers recommendations and reports as required.
  • Provide recommendations and perform logging, correlation, and scanning with provided Government and Cybersecurity tools (Assured Compliance Assessment Solution (ACAS) and Army Endpoint Security System (AESS)).
  • Analyze and correlate risk impact and compliance across all Customer systems, applications, and authorization boundaries.
  • Provides surge support, technical guidance, and expertise in the areas of Cybersecurity to support Customer, Mission Partners, IMOs, ISSOs, IS Owners, Software Developers, Network System, and Database Administrators IAW all related cyber regulations and directives; provide results in reports, briefs, and deliverables as required to the appropriate Government representative.
  • Provide Cybersecurity surge support in the event of real world or additional requirements in support of RMF compliance checks and documentation review across authorization boundaries, including, but not limited to:
    • Perform security review preparation for all security controls associated with RMF applicable to an assigned authorization boundary based upon the Confidentiality, Integrity, or Availability designation.
    • Perform on site or off-site reviews of all information systems to audit and validate compliance with associated security controls.
    • Perform as reviewers of audit teams during inspections, assessments, evaluations, audits, etc.
    • Provide reports to the assigned Government representative as required.
    • Provide reviews, validation, and deliverable efforts in support of compliance or non-compliance IAW CCI, STIGs and SRGs for each finding or vulnerability IAW RMF.
    • Provide embedded Cybersecurity support across Customer or other supported organizations as required.


  • Fort Lauderdale, Florida, United States Software Guidance and Assistance, Inc. Full time

    Job Title: Vulnerability Assessment SpecialistJob Summary:Software Guidance & Assistance, Inc. (SGA) is seeking a skilled Vulnerability Assessment Specialist to join our team. As a key member of our Special Projects Tiger Team, you will participate in the Adversary Emulation program, assisting with internal network and application reconnaissance to identify...


  • Fort Worth, Texas, United States INSPYR Solutions Full time

    Job Title: Vulnerability Management Security AnalystAt INSPYR Solutions, we are seeking a highly skilled Vulnerability Management Security Analyst to join our team. As a key member of our security team, you will be responsible for performing discovery scanning, vulnerability risk assessments, and providing guidance on remediation.Key Responsibilities:Perform...


  • Fort Lauderdale, Florida, United States Axelon Full time

    Job Title: Vulnerability Assessments Security SpecialistJob Summary:Axelon is seeking a skilled Vulnerability Assessments Security Specialist to join our team. As a key member of our Special Projects Tiger Team, you will participate in the Adversary Emulation program by assisting with internal network and application reconnaissance. Your primary...


  • Fort Lauderdale, Florida, United States Simple Solutions Full time

    Job Title: Vulnerability Assessments SpecialistJob Summary: Simple Solutions is seeking a skilled Vulnerability Assessments Specialist to join our team. As a key member of our Red Team, you will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team.The Role:The Vulnerability Assessments Specialist will assist in...


  • Fort Worth, Texas, United States Saxon Global Full time

    Job SummaryWe are seeking a skilled Cybersecurity Engineer - Vulnerability Management to join our team at Saxon Global. As a key member of our security team, you will be responsible for identifying and mitigating vulnerabilities in our IT systems.Key Responsibilities Perform discovery scanning via the Vulnerability Management Platform to identify potential...


  • fort lauderdale, United States TSR Consulting Services, Inc. Full time

    Our client, a leading financial company, is hiring a Vulnerability Assessments Contractor on a contract basis.Job ID #: 80849Work Location: Ft Lauderdale, FLSummary: The Vulnerability Assessments Analyst - Red Team Contractor role will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be...


  • Fort Lauderdale, United States TSR Consulting Services, Inc. Full time

    Our client, a leading financial company, is hiring a Vulnerability Assessments Contractor on a contract basis.Job ID #: 80849Work Location: Ft Lauderdale, FLSummary: The Vulnerability Assessments Analyst - Red Team Contractor role will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be...


  • Fort Lauderdale, Florida, United States TSR Consulting Full time

    Job SummaryThe Vulnerability Assessments Contractor will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be performing internal network and application reconnaissance looking for violations and observations and reporting those up for remediation.Key Responsibilities Support the client's Red...


  • Fort Meade, Maryland, United States Legato, LLC Full time

    Job Title: Vulnerability ResearcherWe are seeking a skilled Vulnerability Researcher to join our team at Legato, LLC. As a Vulnerability Researcher, you will be responsible for identifying and analyzing software vulnerabilities, developing proof-of-concept code, and providing written reports on your findings.About the RoleThis is a dynamic and challenging...


  • Fort Belvoir, United States Y-Tech, LLC Full time

    Job SummaryY-Tech, LLC is seeking a skilled Vulnerability Management Specialist to join our team. As a key member of our cybersecurity team, you will be responsible for analyzing vulnerabilities and characterizing risk to our information systems and computer networks.Key Responsibilities:Analyze vulnerabilities and characterize risk to networks, operating...


  • fort lauderdale, United States BCforward Full time

    Job Title: Vulnerability Assessment AnalystExpected Duration: 6+ MonthsLocation: Fort Lauderdale, FLNote: Only W2 and need local candidatesJob Description:Responsibilities• Support the Client's Red Team in penetration testing and reconnaissance of internal data repositories.• Conduct searches of electronically stored data to extract relevant data...


  • Fort Lauderdale, United States BCforward Full time

    Job Title: Vulnerability Assessment AnalystExpected Duration: 6+ MonthsLocation: Fort Lauderdale, FLNote: Only W2 and need local candidatesJob Description:Responsibilities• Support the Client's Red Team in penetration testing and reconnaissance of internal data repositories.• Conduct searches of electronically stored data to extract relevant data...


  • Fort Lauderdale, United States BCforward Full time

    Job Title: Vulnerability Assessment AnalystExpected Duration: 6+ MonthsLocation: Fort Lauderdale, FLNote: Only W2 and need local candidatesJob Description:Responsibilities• Support the Client's Red Team in penetration testing and reconnaissance of internal data repositories.• Conduct searches of electronically stored data to extract relevant data...


  • Fort Lauderdale, United States Simple Solutions Full time

    Job Title: Vulnerability Assessments AnalystJob Location: Ft. Lauderdale FL (Hybrid 3 Days Onsite)Duration: Until April 10th 2025 The Role:The Vulnerability Assessments Analyst Red Team Contractor role will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be performing internal network and...


  • Fort Lauderdale, United States Simple Solutions Full time

    Job Title: Vulnerability Assessments AnalystJob Location: Ft. Lauderdale FL (Hybrid 3 Days Onsite)Duration: Until April 10th 2025 The Role:The Vulnerability Assessments Analyst Red Team Contractor role will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be performing internal network and...

  • Cybersecurity Lead

    4 weeks ago


    Fort Belvoir, VA , USA, United States Leidos Full time

    Job Title: Cybersecurity LeadLeidos is seeking a highly motivated and experienced Cybersecurity Lead to support large-scale migration and operations on a high-profile DOD contract. The successful candidate will provide security engineering support to various project teams and interface across the program as needed.Key Responsibilities:Provide security...

  • Data Security Analyst

    3 months ago


    Fort Knox, United States Exeter Government Services LLC Full time

    Provide support to the lead security Analyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of...


  • Fort Lauderdale, Florida, United States Axelon Full time

    About the RoleWe are seeking a highly skilled Vulnerability Assessment and Penetration Testing Specialist to join our team. As a key member of our Enterprise Security team, you will be responsible for identifying and mitigating security vulnerabilities in our global infrastructure.Key Responsibilities:Conduct comprehensive vulnerability assessments and...


  • Fort Meade, United States National Security Agency Full time

    Position SummarySystem Vulnerability Analysts (Network Cyber Mitigations Engineers) analyze vulnerabilities and develop mitigations to strengthen defenses. They produce formal and informal reports, briefings, and guidance to defend against attacks against network infrastructure devices or systems. NSA analysts' competencies run the gamut of data transport...

  • CT Scan Technologist

    4 weeks ago


    Fort Wayne, Indiana, United States Jackson HealthPros Full time

    Job SummaryJackson HealthPros is seeking a skilled CT Scan Technologist to join our team of healthcare professionals. As a CT Scan Technologist, you will be responsible for operating CT scan equipment, administering contrast materials, and accurately interpreting physician scanning instructions.Key ResponsibilitiesOperate CT scan equipment to produce...