Vulnerability and Application Scanning Lead
4 months ago
Role: Vulnerability and Application Scanning Lead
Location: Fort Knox, KY OR Remote Work
Education/Certifications: MA/MS preferred; Security+; IAT Level III certifications; Computing Environment Certifications
Years of Experience: 10+
ClearanceLevel & Investigation: Secret
IA Cert Level (DoD 8570.01): IAT Level III (CISSP, GASP+, GCED, or GCIH recommended)
Computing Environment Certifications: Required
JobDescription:
Qualifications:
- Serves as Vulnerability and Application Scanning Lead with experience in performing correlation and scanning of application code (Java, .Net, etc.) with Government provided tools and other prescribed Cybersecurity tools to analyze risk and assess compliance across all systems, applications, and authorization boundaries.
- Provides mitigation and remediation strategies to application developers to address vulnerabilities in code.
- Uses current information security technology disciplines and practices to ensure the confidentiality, integrity, and availability of corporate information assets in accordance with established standards and procedures.
- Develops and maintains knowledgebase on changing regulatory, threat, and technology landscapes to continually develop or maintain security policies and standards, and ensure compliance throughout the organization.
Specific Responsibilities:
- Support execution of contract transition to ensure minimum service disruption to vital business and no service degradation during and after transition; ensure continuity of services while helping onboard personnel and jointly inventory intellectual and real property.
- Perform enterprise-wide risk analysis and vulnerability assessments to assess the command security posture.
- Coordinates and develops recommendations on Cybersecurity incident response, mitigation, remediation actions, or risk determination to protect command information systems from damage, destruction, or alteration IAW all required regulations and directives.
- Performs scans of all static code across all Customer systems and applications with the Government-approved tool.
- Complies with statutory and regulatory requirements supporting boundary authorizations IAW RMF.
- Delivers recommendations and reports as required.
- Provide recommendations and perform logging, correlation, and scanning with provided Government and Cybersecurity tools (Assured Compliance Assessment Solution (ACAS) and Army Endpoint Security System (AESS)).
- Analyze and correlate risk impact and compliance across all Customer systems, applications, and authorization boundaries.
- Provides surge support, technical guidance, and expertise in the areas of Cybersecurity to support Customer, Mission Partners, IMOs, ISSOs, IS Owners, Software Developers, Network System, and Database Administrators IAW all related cyber regulations and directives; provide results in reports, briefs, and deliverables as required to the appropriate Government representative.
- Provide Cybersecurity surge support in the event of real world or additional requirements in support of RMF compliance checks and documentation review across authorization boundaries, including, but not limited to:
- Perform security review preparation for all security controls associated with RMF applicable to an assigned authorization boundary based upon the Confidentiality, Integrity, or Availability designation.
- Perform on site or off-site reviews of all information systems to audit and validate compliance with associated security controls.
- Perform as reviewers of audit teams during inspections, assessments, evaluations, audits, etc.
- Provide reports to the assigned Government representative as required.
- Provide reviews, validation, and deliverable efforts in support of compliance or non-compliance IAW CCI, STIGs and SRGs for each finding or vulnerability IAW RMF.
- Provide embedded Cybersecurity support across Customer or other supported organizations as required.
-
Vulnerability Assessment Specialist
5 days ago
Fort Lauderdale, Florida, United States Software Guidance and Assistance, Inc. Full timeJob Title: Vulnerability Assessment SpecialistJob Summary:Software Guidance & Assistance, Inc. (SGA) is seeking a skilled Vulnerability Assessment Specialist to join our team. As a key member of our Special Projects Tiger Team, you will participate in the Adversary Emulation program, assisting with internal network and application reconnaissance to identify...
-
Vulnerability Management Security Analyst
4 weeks ago
Fort Worth, Texas, United States INSPYR Solutions Full timeJob Title: Vulnerability Management Security AnalystAt INSPYR Solutions, we are seeking a highly skilled Vulnerability Management Security Analyst to join our team. As a key member of our security team, you will be responsible for performing discovery scanning, vulnerability risk assessments, and providing guidance on remediation.Key Responsibilities:Perform...
-
Fort Lauderdale, Florida, United States Axelon Full timeJob Title: Vulnerability Assessments Security SpecialistJob Summary:Axelon is seeking a skilled Vulnerability Assessments Security Specialist to join our team. As a key member of our Special Projects Tiger Team, you will participate in the Adversary Emulation program by assisting with internal network and application reconnaissance. Your primary...
-
Vulnerability Assessments Specialist
4 days ago
Fort Lauderdale, Florida, United States Simple Solutions Full timeJob Title: Vulnerability Assessments SpecialistJob Summary: Simple Solutions is seeking a skilled Vulnerability Assessments Specialist to join our team. As a key member of our Red Team, you will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team.The Role:The Vulnerability Assessments Specialist will assist in...
-
IT Vulnerability Management Specialist
5 days ago
Fort Worth, Texas, United States Saxon Global Full timeJob SummaryWe are seeking a skilled Cybersecurity Engineer - Vulnerability Management to join our team at Saxon Global. As a key member of our security team, you will be responsible for identifying and mitigating vulnerabilities in our IT systems.Key Responsibilities Perform discovery scanning via the Vulnerability Management Platform to identify potential...
-
Vulnerability Assessments Contractor
1 week ago
fort lauderdale, United States TSR Consulting Services, Inc. Full timeOur client, a leading financial company, is hiring a Vulnerability Assessments Contractor on a contract basis.Job ID #: 80849Work Location: Ft Lauderdale, FLSummary: The Vulnerability Assessments Analyst - Red Team Contractor role will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be...
-
Vulnerability Assessments Contractor
1 week ago
Fort Lauderdale, United States TSR Consulting Services, Inc. Full timeOur client, a leading financial company, is hiring a Vulnerability Assessments Contractor on a contract basis.Job ID #: 80849Work Location: Ft Lauderdale, FLSummary: The Vulnerability Assessments Analyst - Red Team Contractor role will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be...
-
Vulnerability Assessments Specialist
4 days ago
Fort Lauderdale, Florida, United States TSR Consulting Full timeJob SummaryThe Vulnerability Assessments Contractor will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be performing internal network and application reconnaissance looking for violations and observations and reporting those up for remediation.Key Responsibilities Support the client's Red...
-
Vulnerability Researcher
1 month ago
Fort Meade, Maryland, United States Legato, LLC Full timeJob Title: Vulnerability ResearcherWe are seeking a skilled Vulnerability Researcher to join our team at Legato, LLC. As a Vulnerability Researcher, you will be responsible for identifying and analyzing software vulnerabilities, developing proof-of-concept code, and providing written reports on your findings.About the RoleThis is a dynamic and challenging...
-
Vulnerability Management Specialist
1 month ago
Fort Belvoir, United States Y-Tech, LLC Full timeJob SummaryY-Tech, LLC is seeking a skilled Vulnerability Management Specialist to join our team. As a key member of our cybersecurity team, you will be responsible for analyzing vulnerabilities and characterizing risk to our information systems and computer networks.Key Responsibilities:Analyze vulnerabilities and characterize risk to networks, operating...
-
Vulnerability Assessment Analyst
6 days ago
fort lauderdale, United States BCforward Full timeJob Title: Vulnerability Assessment AnalystExpected Duration: 6+ MonthsLocation: Fort Lauderdale, FLNote: Only W2 and need local candidatesJob Description:Responsibilities• Support the Client's Red Team in penetration testing and reconnaissance of internal data repositories.• Conduct searches of electronically stored data to extract relevant data...
-
Vulnerability Assessment Analyst
1 week ago
Fort Lauderdale, United States BCforward Full timeJob Title: Vulnerability Assessment AnalystExpected Duration: 6+ MonthsLocation: Fort Lauderdale, FLNote: Only W2 and need local candidatesJob Description:Responsibilities• Support the Client's Red Team in penetration testing and reconnaissance of internal data repositories.• Conduct searches of electronically stored data to extract relevant data...
-
Vulnerability Assessment Analyst
7 days ago
Fort Lauderdale, United States BCforward Full timeJob Title: Vulnerability Assessment AnalystExpected Duration: 6+ MonthsLocation: Fort Lauderdale, FLNote: Only W2 and need local candidatesJob Description:Responsibilities• Support the Client's Red Team in penetration testing and reconnaissance of internal data repositories.• Conduct searches of electronically stored data to extract relevant data...
-
Vulnerability Assessments Analyst-HYBRID
5 days ago
Fort Lauderdale, United States Simple Solutions Full timeJob Title: Vulnerability Assessments AnalystJob Location: Ft. Lauderdale FL (Hybrid 3 Days Onsite)Duration: Until April 10th 2025 The Role:The Vulnerability Assessments Analyst Red Team Contractor role will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be performing internal network and...
-
Vulnerability Assessments Analyst-HYBRID
5 days ago
Fort Lauderdale, United States Simple Solutions Full timeJob Title: Vulnerability Assessments AnalystJob Location: Ft. Lauderdale FL (Hybrid 3 Days Onsite)Duration: Until April 10th 2025 The Role:The Vulnerability Assessments Analyst Red Team Contractor role will participate in the Adversary Emulation program by assisting with our Special Projects Tiger Team. This team will be performing internal network and...
-
Cybersecurity Lead
4 weeks ago
Fort Belvoir, VA , USA, United States Leidos Full timeJob Title: Cybersecurity LeadLeidos is seeking a highly motivated and experienced Cybersecurity Lead to support large-scale migration and operations on a high-profile DOD contract. The successful candidate will provide security engineering support to various project teams and interface across the program as needed.Key Responsibilities:Provide security...
-
Data Security Analyst
3 months ago
Fort Knox, United States Exeter Government Services LLC Full timeProvide support to the lead security Analyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of...
-
Fort Lauderdale, Florida, United States Axelon Full timeAbout the RoleWe are seeking a highly skilled Vulnerability Assessment and Penetration Testing Specialist to join our team. As a key member of our Enterprise Security team, you will be responsible for identifying and mitigating security vulnerabilities in our global infrastructure.Key Responsibilities:Conduct comprehensive vulnerability assessments and...
-
System Vulnerability Analyst
4 weeks ago
Fort Meade, United States National Security Agency Full timePosition SummarySystem Vulnerability Analysts (Network Cyber Mitigations Engineers) analyze vulnerabilities and develop mitigations to strengthen defenses. They produce formal and informal reports, briefings, and guidance to defend against attacks against network infrastructure devices or systems. NSA analysts' competencies run the gamut of data transport...
-
CT Scan Technologist
4 weeks ago
Fort Wayne, Indiana, United States Jackson HealthPros Full timeJob SummaryJackson HealthPros is seeking a skilled CT Scan Technologist to join our team of healthcare professionals. As a CT Scan Technologist, you will be responsible for operating CT scan equipment, administering contrast materials, and accurately interpreting physician scanning instructions.Key ResponsibilitiesOperate CT scan equipment to produce...