Sr Vulnerability Analyst
4 hours ago
Bachelor's degree or equivalent experience
Minimum Experience
5
Summary
Leads the instrumentation and administration of cybersecurity tools, appliances, and measures to protect the Board's IT assets and ensure the Board's ability to conduct its mission. Utilizes cybersecurity tools such as firewalls, proxies, intrusion detection, intrusion prevention, endpoint protection, and data analysis platforms as part of an integrated, defense in depth solution with a central security information and event management (SIEM) system and security orchestration tools. Develops an advanced understanding of system architecture and the ability to identify security weaknesses that can be exploited to compromise a variety of systems used by the Board. Develops technical products and presents highly technical subjects to a variety of audiences ranging from non-technical senior leaders to highly technical subject matter experts. Leads collaboration with other cybersecurity professionals to develop and implement cybersecurity solutions that enable threat hunt activities. With some guidance provides technical and analytical assessments to support information security engineering decisions to ensure Board information and systems are adequately protected.
Duties and Responsibilities
- Leads and/or participates in implementing cybersecurity tools such as firewalls, proxies, intrusion detection, intrusion prevention, endpoint protection, and data analysis platforms as part of an integrated defense in depth solution with a central security information and event management (SIEM) system and security orchestration tools. Leads technical and analytical assessments to support information security engineering decisions to ensure Board information and systems are adequately protected. Ability to characterize and manage moderately complex risks to mitigate cyber threats.
- With some guidance, proactively supports analysis of threat intelligence from a variety of sources to understand the nature of the threat, extract the information that informs threat hunt operations, and uses that information to investigate Board IT assets for evidence of an intrusion or compromise.
- With some guidance, emulates threat actor tactics, techniques, and procedures in a controlled and/or production environment to demonstrate and observe the technical aspects of the emulated activity. Leads and/or develops adequate detection strategies and develops mitigations as needed to address the specific details of the threat.
- Leads the development of programs that apply statistical models, mathematical principles, and other analytic tradecraft to a variety of IT network-generated data for the purposes of identifying anomalous activity, suspicious network activity, and ultimately leads to the discovery of intrusions and/or compromises.
- With some guidance, identifies and analyzes system-generated logs and capture forensic images of a variety of systems for the purposes of fully analyzing a cybersecurity intrusion and/or compromise. Includes use of advanced knowledge to perform root cause analysis and develop timelines to show the actions taken by a cyber threat actor in an environment. Leads the completion of all phases of the incident response process including identification, containment, eradication, and remediation.
- Leads implementation of vulnerability scans and ensures operational systems are adequately patched to protect the Board from potential cyber threat actors. Leads the analysis of vulnerabilities and proof of concept code as it becomes available to assess the technical implications of a given threat and ensure that the Board's defenses are sufficient. Maintains advanced knowledge of ethical hacking principles to apply the skills to the management of vulnerabilities and mitigation of technical risk. Ensures that vulnerabilities are managed and patched according to Board policies and procedures.
- Leads the development of and/or develops data analytic software and cybersecurity scripts using a variety of programming and scripting languages to enable cybersecurity activities designed to defend the Board's IT assets. With limited guidance, develops programs, software, and scripts that automate the cybersecurity process. With limited guidance, develops data queries and scheduled jobs designed to correlate data for further analysis. With limited guidance, integrates tools and systems for advanced analysis of relevant data.
- With moderate guidance, manages cybersecurity projects focused on developing and instrumenting moderately complex approaches to detect, prevent, and respond to cybersecurity intrusions and/or compromises. Authors documents and oversees the execution of project plans, schedules, requirements, risks, assumptions, cost, performance, and resource utilization with minimal supervision.
Position Requirements
Duties and Responsibilities
• Leads and/or participates in implementing cybersecurity tools such as firewalls, proxies, intrusion detection, intrusion prevention, endpoint protection, and data analysis platforms as part of an integrated defense in depth solution with a central security information and event management (SIEM) system and security orchestration tools. Leads technical and analytical assessments to support information security engineering decisions to ensure Board information and systems are adequately protected. Ability to characterize and manage moderately complex risks to mitigate cyber threats.
• With some guidance, proactively supports analysis of threat intelligence from a variety of sources to understand the nature of the threat, extract the information that informs threat hunt operations, and uses that information to investigate Board IT assets for evidence of an intrusion or compromise.
• With some guidance, emulates threat actor tactics, techniques, and procedures in a controlled and/or production environment to demonstrate and observe the technical aspects of the emulated activity. Leads and/or develops adequate detection strategies and develops mitigations as needed to address the specific details of the threat.
• Leads the development of programs that apply statistical models, mathematical principles, and other analytic tradecraft to a variety of IT network-generated data for the purposes of identifying anomalous activity, suspicious network activity, and ultimately leads to the discovery of intrusions and/or compromises.
• With some guidance, identifies and analyzes system-generated logs and capture forensic images of a variety of systems for the purposes of fully analyzing a cybersecurity intrusion and/or compromise. Includes use of advanced knowledge to perform root cause analysis and develop timelines to show the actions taken by a cyber threat actor in an environment. Leads the completion of all phases of the incident response process including identification, containment, eradication, and remediation.
• Leads implementation of vulnerability scans and ensures operational systems are adequately patched to protect the Board from potential cyber threat actors. Leads the analysis of vulnerabilities and proof of concept code as it becomes available to assess the technical implications of a given threat and ensure that the Board's defenses are sufficient. Maintains advanced knowledge of ethical hacking principles to apply the skills to the management of vulnerabilities and mitigation of technical risk. Ensures that vulnerabilities are managed and patched according to Board policies and procedures.
• Leads the development of and/or develops data analytic software and cybersecurity scripts using a variety of programming and scripting languages to enable cybersecurity activities designed to defend the Board's IT assets. With limited guidance, develops programs, software, and scripts that automate the cybersecurity process. With limited guidance, develops data queries and scheduled jobs designed to correlate data for further analysis. With limited guidance, integrates tools and systems for advanced analysis of relevant data.
• With moderate guidance, manages cybersecurity projects focused on developing and instrumenting moderately complex approaches to detect, prevent, and respond to cybersecurity intrusions and/or compromises. Authors documents and oversees the execution of project plans, schedules, requirements, risks, assumptions, cost, performance, and resource utilization with minimal supervision.
Position Requirements
FR-26 Minimal Qualifications
Requires a bachelor's degree in computer science, information technology, cybersecurity or a related business technology field and five years of experience. Must have advanced knowledge in in at least one of the following areas: general cybersecurity fundamentals, cyber threat analysis, data science principles, digital forensics, incident handling, incident management, incident response, vulnerability management, security engineering, automation and programming, project management, and relevant technologies and programming languages. Must be able to work effectively with staff. Must be familiar with relevant policies, procedures, and be able to work with TOP SECRET / SENSITIVE COMPARTMENTED INFORMATION. Must be able to support one or more of the following: providing threat assessments, recommending cybersecurity technologies for intrusion detection and prevention, assessing technical vulnerabilities, identifying automation opportunities, investigating, and resolving security breaches, technical writing, and communication.
FR-27 Minimal Qualifications
Requires a bachelor's degree in computer science, information technology, cybersecurity or a related business technology field and six years of experience. Must have expert knowledge in the in at least one of the following areas: general cybersecurity fundamentals, cyber threat analysis, data science principles, digital forensics, incident handling, incident management, incident response, vulnerability management, security engineering, automation and programming, project management, and relevant technologies and programming languages. Must be able to work effectively with staff. Must be familiar with relevant policies, procedures, and be able to work with TOP SECRET / SENSITIVE COMPARTMENTED INFORMATION. Must be able to lead one or more of the following: providing threat assessments, recommending cybersecurity technologies for intrusion detection and prevention, assessing technical vulnerabilities, identifying automation opportunities, investigating, and resolving security breaches, technical writing, and communication.
FR-28 Minimal Qualifications
Requires a bachelor's degree in computer science, information technology, cybersecurity or a related business technology field and eight years of experience. Must have expert knowledge in the in at least one of the following areas: general cybersecurity fundamentals, cyber threat analysis, data science principles, digital forensics, incident handling, incident management, incident response, vulnerability management, security engineering, automation and programming, project management, and relevant technologies and programming languages. Must be able to work effectively with staff. Must be familiar with relevant policies, procedures, and be able to work with TOP SECRET / SENSITIVE COMPARTMENTED INFORMATION. Must be able to direct one or more of the following: providing threat assessments, recommending cybersecurity technologies for intrusion detection and prevention, assessing technical vulnerabilities, identifying automation opportunities, investigating, and resolving security breaches, technical writing, and communication.
Remarks: The Sr. Vulnerability Analyst (Sr. Cybersecurity Analyst) is an individual contributor position responsible for leading the enterprise vulnerability management program for the Board. The Sr. Vulnerability Analyst (Sr. Cybersecurity Analyst) possesses knowledge of policies and best practices pertinent to vulnerability management and has the ability to operationalize that information in the form of organizational governance and technical process (NIST, DHS/CISA, OWASP, NVD, SEI, etc.). The Sr. Vulnerability Analyst (Sr. Cybersecurity Analyst) consumes cyber threat intelligence that describes new and emerging vulnerabilities and translates that information into active defense and preventive measures. The Sr. Vulnerability Analyst (Sr. Cybersecurity Analyst) analyzes systems for potential weaknesses and/or vulnerabilities and proposes solutions to mitigate those risks. The Sr. Vulnerability Analyst (Sr. Cybersecurity Analyst) establishes and oversees patch management operations for all kinds of assets in the environment and designs mitigations where patching is impractical or impossible. The Sr. Vulnerability Analyst (Sr. Cybersecurity Analyst) establishes and implements a risk management approach for vulnerabilities including thresholds, mitigations, and risk tolerances that drives other vulnerability response actions. The Sr. Vulnerability Analyst (Sr. Cybersecurity Analyst) provides services including static and dynamic application security testing, web application vulnerability scanning, vulnerability analysis, enterprise patch management, and proposing mitigations for specific threats. The Sr. Vulnerability Analyst (Sr. Cybersecurity Analyst) develops technical products and presents highly technical subjects to a variety of audiences ranging from non-technical senior leaders to highly technical subject matter experts. The Sr. Vulnerability Analyst (Sr. Cybersecurity Analyst) collaborates with other vulnerability management professionals in the Federal space and throughout the Federal Reserve System to develop and implement cybersecurity solutions that enable vulnerability management activities. The Sr. Vulnerability Analyst (Sr. Cybersecurity Analyst) provides technical and analytical vulnerability assessments to support information security engineering decisions to ensure Board information and systems are adequately protected.
Highly Desirable:
• At least 5-7 years of full-time experience supporting a vulnerability management program.
• Experience applying industry standards and best practices in an operational environment to adequately manage risk and mitigate vulnerabilities as part of an enterprise service.
• Experience with a variety of vulnerability and patch management technologies including, but not limited to, Qualys, Tenable, Nessus, Invicti, Fortify, CrowdStrike Falcon Spotlight, Microsoft Defender Vulnerability Management, etc.
• Experience applying expert knowledge of adversary tactics, techniques, and procedures to identify, prioritize, and ultimately respond to vulnerabilities identified within the Board's enterprise network.
• Experience mentoring less experienced team members in vulnerability management and response activities.
• Experience in vulnerability analysis, threat modeling, and designing mitigation and remediation strategies.
• Experience managing vulnerabilities in on-premises systems, mobile devices, and in cloud environments, (e.g. Amazon Web Services, Microsoft Azure, Google Cloud, and Data Centers).
• Experience developing programs and/or automated tools using a programming / scripting languages (e.g. Python, PowerShell, etc.).
• Familiarity with relevant policies, procedures, and be able to work with TOP SECRET / SENSITIVE COMPARTMENTED INFORMATION.
• Demonstrated resourcefulness and advanced critical thinking skills to independently direct, analyze, and implement solutions for all the various complex problems that arise in the administrative and operations area.
• Expert technical writing and communications skills. Contacts are often with division leadership, but also with staff at all levels; a significant degree of coordination and contact with other units/sections/divisions may also be required.
• Ability to construct clear and concise written work and applies an increasingly advanced understanding of grammar, sentence structure, and intended audience(s) to the process of writing and editing such work.
• Ability to explain to cross-team or cross-divisional partners items of high levels of complexity.
• Possess skills in negotiation and persuasion in performing duties and influencing support for change.
This position is hybrid, requiring a combination of telework and in-office presence in Washington, DC
-
Senior Vulnerability Analyst
1 week ago
Washington, Washington, D.C., United States SAIC Full timeJob DescriptionSAIC is seeking a highly skilled Senior Vulnerability Analyst with a strong technical background to support a critical US government agency in the National Capital Region.Responsibilities:Lead technical projects with a focus on analytics and security.Serve as a Subject Matter Expert (SME) in web application scanning and device scanning.Utilize...
-
washington, United States TalentRemedy Full timeAs a member of the Information Security Incident Response team, the Sr. Information Security Analyst– Incident Response will coordinate the response activities for cyber security incidents across the corporate environment. You’ll focus on reviewing, triaging, analyzing, remediating, and reporting on cyber security incidents. As the Sr. Information...
-
Sr. Information Security Analyst– Incident Response
2 months ago
washington, United States TalentRemedy Full timeAs a member of the Information Security Incident Response team, the Sr. Information Security Analyst– Incident Response will coordinate the response activities for cyber security incidents across the corporate environment. You’ll focus on reviewing, triaging, analyzing, remediating, and reporting on cyber security incidents. As the Sr. Information...
-
Sr. Information Security Analyst– Incident Response
2 months ago
Washington, United States TalentRemedy Full timeAs a member of the Information Security Incident Response team, the Sr. Information Security Analyst– Incident Response will coordinate the response activities for cyber security incidents across the corporate environment. You’ll focus on reviewing, triaging, analyzing, remediating, and reporting on cyber security incidents. As the Sr. Information...
-
Forensics Analyst Sr.
6 months ago
Washington, United States Gray Tier Technologies Full timeGray Tier Technologies is seeking a Senior Forensics Analyst with an active Secret clearance to support our DOI customer's Security Operation Center in DC or Reston Virginia.. The Department of the Interior (DOI) protects America's natural resources and heritage, honors our cultures and tribal communities, and supplies the energy to power our...
-
Sr. Business Analyst
4 months ago
Washington, United States Ampcus Full timeJob Title: Sr. Business Analyst Location: Washington DC - 1 day in a week Duration: 6+ Months with possible extension Summary: • Proven experience as a Business Analyst on large-scale projects involving multiple agencies. • Knowledge of processes, regulations, and compliance requirements. • Experience determining the explicit and implicit needs and...
-
Sr Business Analyst
11 hours ago
Washington, United States ALTA IT Services Full timeALTA IT Services has a Contract to hire opening for a Business Analyst to support a leading, Washington DC based health insurance customer. We are seeking a Sr. Business Analyst with extensive experience in Conversational AI analysis, research, documentation, and use case development. The Senior Business Analyst will have the responsibility to ensure that...
-
Washington, DC, United States TalentRemedy Full timeAs a member of the Information Security Incident Response team, the Sr. Information Security Analyst– Incident Response will coordinate the response activities for cyber security incidents across the corporate environment. You’ll focus on reviewing, triaging, analyzing, remediating, and reporting on cyber security incidents. As the Sr. Information...
-
Sr Business Analyst
20 hours ago
Washington, United States ALTA IT Services Full timeALTA IT Services has a Contract to hire opening for a Business Analyst to support a leading, Washington DC based health insurance customer. We are seeking a Sr. Business Analyst with extensive experience in Conversational AI analysis, research, documentation, and use case development. The Senior Business Analyst will have the responsibility to ensure that...
-
Sr. Procurement Analyst
3 days ago
Washington, DC, United States Bristol Bay Native Corp. Full timeTekPro Support Services, LLC is hiring for a Sr. Procurement Analyst. The Sr. Procurement Analyst supports project documentation and procedures for their command station. Responsibilities: Analyze Procurement data and market trends to support decision-making, identify patterns and forecast future needs. Oversee the drafting, negotiation and management of...
-
Advanced Analytics Analyst Sr.
3 days ago
Washington, United States Elevance Health Full timeAnticipated End Date: 2024-12-16 Position Title: Advanced Analytics Analyst Sr. Job Description: Advanced Analytics Analyst Sr. Location: This position will work a hybrid model (remote and in office 1 - 2 days per week). Candidates must live within 50 miles of one of Elevance's Pulse Point locations. The Advanced Analytics Analyst Sr. is responsible for...
-
Tier 3 SOC Analyst
11 hours ago
Washington, United States Quadrant Inc Full timeJob ID: 24-04287 Tier 3 SOC Analyst Washington DC Pay From: $125,000/yr MUST: 5+ years of related experience in a SOC environment CISSP or other IAM/IAT Level III certification required Required experience network technologies such as: Windows, Linux Operating Systems; Database security, Active Directory, Service Oriented Architectures,...
-
Sr. Financial Analyst
4 weeks ago
Washington, DC , USA, United States Tech Marine Business Full timeJob SummaryThis Sr. Financial Analyst position is a key member of the Tech Marine Business team, providing critical financial support to U.S. Navy program offices. The ideal candidate will have at least 15 years of experience in this field and a strong background in financial management.
-
Tier 3 SOC Analyst
6 days ago
Washington, United States Quadrant Full timeTier 3 SOC Analyst Washington DC Pay From: $125,000/yr MUST: 8+ years of related experience in a SOC environment CISSP or other IAM/IAT Level III certification required Required experience network technologies such as: Windows, Linux Operating Systems; Database security, Active Directory, Service Oriented Architectures, vulnerability testing, networking...
-
Cyber Security Analyst
4 months ago
Washington, United States MSR Collective Full timeCyber Security Analyst with TS/SCI Clearance and Polygraph We are actively seeking a skilled and dedicated Cyber Security Analyst with an active TS/SCI clearance and polygraph to join our dynamic team. As a Cyber Security Analyst, you will play a vital role in coordinating and enhancing the cybersecurity efforts of our organization, working alongside...
-
Sr Curam Business Analyst
1 week ago
Washington, United States InterSources Full timeSr Curam Business Analyst Address: Washington DC - 100% remote 12 Months Contract / Full Time Position Job Description: Our client is looking for a candidate who must be customer service oriented, have strong interpersonal skills, and possess the ability to multi-task when required. Excellent verbal, written and presentation skills are a mandatory...
-
Sr. Business Analyst
2 days ago
Washington, DC, United States Ampcus, Inc Full timeJob Title: Sr. Business Analyst Location: Washington DC - 1 day in a week Duration: 6+ Months with possible extension Summary: Proven experience as a Business Analyst on large-scale projects involving multiple agencies. Knowledge of processes, regulations, and compliance requirements. Experience determining the explicit and implicit needs and...
-
Tier 3 SOC Analyst
22 hours ago
Washington, United States Quadrant Full timeTier 3 SOC Analyst Washington DC Pay From: $125,000/yr MUST: 5+ years of related experience in a SOC environment CISSP or other IAM/IAT Level III certification required Required experience network technologies such as: Windows, Linux Operating Systems; Database security, Active Directory, Service Oriented Architectures, vulnerability testing, networking...
-
Security Operations Center Analyst
2 days ago
Washington, United States Insight Global Full timePay: 120k-135kTier 3 SOC AnalystPossess a working knowledge of network technologies such as: Windows, Linux Operating Systems; Database security, Active Directory, Service Oriented Architectures, vulnerability testing, networking protocols and topologies, security architectures, and incident management.Develops technical solutions including information...
-
Sr IT Automation QA Analyst
2 months ago
washington, United States Serigor Inc Full timeJob Title: Sr IT Automation QA AnalystLocation: 100% Remote – EST Time zoneDuration: 12+ MonthsSummary:Looking for a Sr Automation Test Engineer who has experience in the Clinical or Healthcare DomainResponsible for quality activities within the Information Technology (IT) department by supporting audits on behalf of IT reviewing computer systems &...