Job Details – this job has expired, please see similar jobs below
The Vulnerability Scanning Specialists primary responsibility will be vulnerability scanning of all enterprise systems in order to determine compliancy and report results. They will also be involved with product evaluation and various aspects of system administration. This position requires a strong background understanding UNIX/Linux and Windows operating systems.
Collaborate with other members of the IA/scanning team on daily issues.
Research and explain software vulnerabilities for multiple operating systems.
Diagnose and resolve scanner software problems, and restore normal operation.
Determine software configurations that achieve a high level of security for systems and applications
Makes recommendations for enhancements to improve efficiency, reliability, and security.
Provide quality customer service.
Provide off-hour response to emergency situations
Interpret vulnerability scan output and provide quantitative analysis of the results to management
Perform wireless assessments of client sites to meet monthly compliance standards.
Work with the other IT support teams in troubleshooting and remediating outstanding vulnerabilities
Develop scanning solutions for research networks
Security clearance required
5 years relevant IT experience: 2 years experience in Information Systems and/or security experience with at least 2 of those years in network software and hardware
Bachelor’s degree in a related field or equivalent work experience
Vulnerability scanning experience using Retina, NMAP and/or Nessus
Hands on experience working with HBSS and troubleshooting ePO Servers.
Extensive experience running ACAS Scans, patching servers and ensuring eMASS and RMF compliance
Experience with TCP/IP network protocols
Excellent written and oral communication skills, and the ability to develop and execute detailed written plans for complex software and hardware implementations.
Strong ability to develop effective written procedures and SOPs to guide daily operations.
DoD 8570 compliant by obtaining/maintaining required certifications prior to start
Familiarity with DoD and Army IAVM policies and procedures
Experience documenting technical standards and procedures
Linux/UNIX and Windows OS security
Knowledge of DoD and/Army computer security policies.
Understanding of hacking techniques and methodology
Familiarity with vulnerability scanning techniques
First-hand experience with installing and configuring Windows and Linux/Unix operating systems
The ability to multi-task and work independently or as part of a team depending on the project
Provide quality customer service with excellent problem solving skills
Working at Company
Working at Company means applying a passion for meaningful work with intellectual rigor to help solve the leading issues of our day. Smart, compassionate, innovative, committed, Company employees tackle unprecedented challenges to benefit people, businesses, and governments around the globe. We believe in collaboration, mutual respect, open communication, and opportunity for growth. If you’re seeking to make a difference in the world, visit Company website to find your next career. Company—together for tomorrow.
Company is an equal opportunity employer that values diversity at all levels. (EOE – Minorities/Females/ Protected Veterans Status/Disability Status/Sexual Orientation/Gender Identity)
Reasonable Accommodations are available for disabled veterans and applicants with disabilities in all phases of the application and employment process. To request an accommodation please email ___@___(apply_to_show_email) and we will be happy to assist. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. Read more about non-discrimination: EEO is the law and Pay Transparency Statement.
Maryland Client Office (MD88)
Sign up and search through 19,795 curated jobs in the Consulting Edition: