Current jobs related to Vulnerability Assessment Analyst - Springfield - Elite Technical's Customer


  • Springfield, United States Zolon Tech Solutions, Inc. Full time

    Title : Vulnerability Assessment Analyst Location : Springfield, VA Duration : Full Time Permanent Clearance required: TS/SCI with CI Poly Clearance Job Description:Work Role Description Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or...


  • Springfield, United States Zolon Tech Solutions, Inc. Full time

    Title : Vulnerability Assessment Analyst Location : Springfield, VA Duration : Full Time Permanent Clearance required: TS/SCI with CI Poly Clearance Job Description:Work Role Description Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy,...


  • Springfield, United States MKS2 Technologies Full time

    Job DescriptionJob DescriptionMKS2 Technologies, LLC, an award-winning high growth small business, creates innovative and customer-centric technology solutions in the areas of Cyber Security, Instructional Design and Training, Software Engineering and IT Support Services to improve the security and well-being of our clients. Our commitment to excellence and...


  • Springfield, Illinois, United States V2X Full time

    Job DescriptionJob Summary:V2X is seeking a highly skilled Cybersecurity Vulnerability Specialist to join our team. As a key member of our cybersecurity team, you will be responsible for developing and executing our continuous vulnerability assessment strategy.Key Responsibilities:Develop and Execute Vulnerability Assessment Strategy: Develop and execute the...


  • Springfield, Illinois, United States V2X Full time

    Job DescriptionV2X is seeking a highly skilled Cybersecurity Vulnerability Specialist to join our team. As a key member of our cybersecurity team, you will be responsible for identifying and mitigating vulnerabilities in our enterprise network.Key ResponsibilitiesDevelop and execute a comprehensive vulnerability assessment strategy to identify and prioritize...


  • Springfield, Illinois, United States V2X Full time

    Job Title: Computer Network Defense Vulnerability SpecialistV2X is seeking a highly skilled Computer Network Defense Vulnerability Specialist to join our team. As a key member of our cybersecurity team, you will be responsible for identifying and mitigating vulnerabilities in our enterprise network.Key Responsibilities:Develop and execute a comprehensive...


  • Springfield, Illinois, United States V2X Full time

    Job DescriptionV2X is seeking a highly skilled Cybersecurity Vulnerability Specialist to join our team. As a key member of our cybersecurity team, you will be responsible for identifying and mitigating vulnerabilities in our enterprise network.Key ResponsibilitiesDevelop and execute a comprehensive vulnerability assessment strategy to identify and prioritize...


  • Springfield, United States Vectrus Full time

    Overview Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients,...


  • Springfield, United States V2X Full time

    OverviewWorking across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients,...


  • Springfield, Illinois, United States V2X Full time

    About the RoleWe are seeking a highly skilled Cybersecurity Vulnerability Specialist to join our team at V2X. As a key member of our cybersecurity team, you will be responsible for identifying and mitigating vulnerabilities in our enterprise network.Key ResponsibilitiesDevelop and Execute Vulnerability Assessment StrategyDesign and implement a comprehensive...


  • Springfield, Illinois, United States V2X Full time

    Job DescriptionJob Summary:V2X is seeking a highly skilled Cybersecurity Vulnerability Specialist to join our team. As a key member of our cybersecurity team, you will be responsible for developing and executing our continuous vulnerability assessment strategy.Key Responsibilities:Develop and Execute Vulnerability Assessment Strategy: Develop and execute the...


  • Springfield, Illinois, United States Vectrus Full time

    Job Title: Insider Threat AnalystOverviewVectrus is seeking a highly skilled Insider Threat Analyst to support our innovative new project, focusing on threat assessment and mitigation. This role will involve conducting thorough threat analysis, providing comprehensive assessments of vulnerabilities and risks, and utilizing advanced analytics tools to collect...


  • Springfield, Virginia, United States GuidePoint Security Full time

    About the RoleGuidePoint Security is seeking a highly skilled Vulnerability Management Specialist to join our team. As a key member of our cybersecurity team, you will be responsible for executing vulnerability scans, analyzing scan results, and reporting on findings. You will also be responsible for building and implementing automated vulnerability...


  • Springfield, United States Fusion Technology LLC Full time

    Job DescriptionJob DescriptionFusion Technology is a performance-driven HUBZone Small Business concern residing in the heart of the beautiful mountainsides of West Virginia, steps away from the Federal Bureau of Investigation's Criminal Justice Information Services Division's Headquarters. Founded in 2007 by an Engineer-by-trade, Fusion Technology...

  • Insider Threat Analyst

    4 months ago


    Springfield, United States Vectrus Full time

    Overview This role is in support of an exciting new effort and is contingent upon contract award. Responsibilities Insider Threat Analysts conduct threat analysis, provide assessments of threats and vulnerabilities, produce investigative leads, uncover policy violations, assess risk posed by trusted insiders, oversee the data collection effort on...


  • Springfield, Illinois, United States Booz Allen Hamilton Full time

    About the RoleWe are seeking a highly skilled Biological Threats Analyst, Senior to join our team at Booz Allen Hamilton. As a key member of our team, you will play a critical role in conducting biological programs analysis, identifying technical capabilities, security, and vulnerabilities of threat programs, and providing strategic recommendations to...


  • Springfield, Illinois, United States Booz Allen Hamilton Full time

    About the OpportunityWe are seeking a highly skilled Biomedical Engineer, Senior to support defense analytical requirements with enhanced scientific and bio-engineering research, reverse bio-engineering analysis and characterizations, facility and vulnerability assessments, and analytic production on foreign biomedical capabilities.Key...


  • Springfield, Illinois, United States Booz Allen Hamilton Full time

    About the OpportunityWe are seeking a highly skilled Biomedical Engineer, Senior to support defense analytical requirements with enhanced scientific and bio-engineering research, reverse bio-engineering analysis and characterizations, facility and vulnerability assessments, and analytic production on foreign biomedical capabilities.Key...


  • Springfield, United States Transportation Security Administration Full time

    This Transportation Security Specialist (Cyber Analyst) position is located in the Cyber Security Section, Surface Division, Policy, Plans and Engagement (PPE), Transportation Security Administration (TSA), Department of Homeland Security (DHS). Duties include but are not limited to: Contributes to defining the desired state of cybersecurity policy, and...

  • Insider Threat Analyst

    4 months ago


    Springfield, United States V2X Full time

    OverviewThis role is in support of an exciting new effort and is contingent upon contract award.  ResponsibilitiesInsider Threat Analysts conduct threat analysis, provide assessments of threats and vulnerabilities, produce investigative leads, uncover policy violations, assess risk posed by trusted insiders, oversee the data collection effort on NGA’s...

Vulnerability Assessment Analyst

4 months ago


Springfield, United States Elite Technical's Customer Full time

Vulnerability Assessment Analyst (Cyber)

Our client, a federal contractor is seeking a Vulnerability Assessment Analyst to perform assessments of systems and networks within the network environment or enclave and identifying where those systems/networks deviate from acceptable configurations, enclave policy, or local policy.

The position is 100% onsite at the government facility in Springfield, VA. Our client is looking to onboard as a direct employee.

Responsibilities:

Developing measures of effectiveness for defense-in-depth architectures against known vulnerabilities.

- Identifying systemic security issues based on the analysis of vulnerability and configuration data.

- Apply programming language structures (e.g., source code review) and logic.

- Sharing meaningful insights about the context of an organization-s threat environment that improves its risk management posture.

- Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

- Provide analysis and remediation recommendations to address Tasking Orders (TASKORD), POA&Ms, Operational Orders (OPORDS), Information Assurance Vulnerability Management (IAVMs), Vulnerability Disclosure Program (VDP), Period of Non-Disruption (POND), Operational Planning (OPLAN), Rouge System Detection, and

Security Technical Implementation Guide (STIG) compliance as required within government directed timelines across the entirety of client's enterprise.

- Provide support to Vulnerability Management initiatives and tools (e.g., Red Seal, WebInspect) over the entirety of the SDLC.

- Support TASKORDs tickets that require remediation, fix validation, tracking and ticket closures.

Required Skills

- Must be US Citizen due to government clearance requirement

- Active TS/SCI Clearance

- Bachelor-s degree or higher from an accredited college or university. (Prefer an accredited Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree, or a degree in a Mathematics or Engineering field.

- Meet DoD 8570/8140 requirements at a minimum IAM or IAT Level 2 certification, e.g. Security+, GSEC, CAP, CASP, CISSP, GSLC

- Knowledge of Government standards for data security such as markings, handling of classified and unclassified information, and how to handle the distribution of this information.

- Knowledge of computer networking concepts and protocols, and network security methodologies, risk management processes (e.g., methods for assessing and mitigating risk), and laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.

- Knowledge of cyber threats and vulnerabilities, and operational impacts of cybersecurity lapses.

- Knowledge of cryptography and cryptographic key management concepts and

host/network access control mechanisms (e.g., access control list, capabilities list).

- Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

- Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

- Knowledge of what constitutes a network attack and a network attack-s relationship to both threats and vulnerabilities.

- Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).

- Detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort).

- Mimicking threat behaviors and the use of penetration testing tools and techniques.

- Using network analysis tools to identify vulnerabilities. (e.g., fuzzing, Nmap, etc.).

- Reviewing logs to identify evidence of past intrusions and conducting application vulnerability assessments.

- Conducting ethical hacking and penetration testing following established principles and techniques