Help us create a world class incident response center!
Vulnerability Manager (VM)
At Secure Technologies Group we offer a steady and challenging career path. We have tremendous opportunities for those self-starting professionals who are looking for a challenge and are ready for a change. To meet the demands of the industry’s ever changing salary environment, Secure Tech has modernized our compensation package to maximize total compensation to our employees. For a work environment that’s fast-paced and high-performance as well as stable and growth-oriented, apply today!
Clearance Level: Must have TS/SCI
Vulnerability management requires preemptive actions to identify, remediate, and mitigate vulnerabilities to prevent exploitation. The VM receives vulnerability input, direction, and guidance from multiple sources and takes directed action to effectively mitigate vulnerabilities to protect networks. Leverages an operational understanding of current vendor remediation’s to prioritize vulnerability escalation procedures and integrates continuous monitoring to ensure mitigations fall within prescribed timelines.
Requires DoD 8570 certification compliance with IAT Level I, Computing Environment, and SPLUNK Fundamentals I.
Requires four (4) years of demonstrated experience as a Vulnerability Manager, two (2) years experience in technical reporting and network threat analysis. (A Bachelor's degree in a technical discipline can substitute for 2 yrs experience).
Some capabilities expected of a candidate for this position:
- Knowledge of cyber threats and vulnerabilities.
- Determine overall Common Vulnerabilities and Exposures (CVE) priority when threat activity is identified; report incidents that may cause immediate and/or ongoing impact to the environment.
- Monitor and provide periodic system owners vulnerability mitigation completion updates.
- Knowledge of system and application security threats, vulnerabilities, and cyber attackers.
- Monitor external data sources to determine which security issues may have an impact on the enterprise.
- Identify, develop, and determine mitigation or remediation actions for system and network vulnerabilities.
- Communicate written and verbal information in a timely, clear, and concise manner.
- Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
- Knowledge of system administration, network, operating system hardening techniques, and the risk management process.
- Knowledge of specific operational impacts of cybersecurity lapses and organization's threat environment.
- Recommend impact/risk assessments to identify systemic security issues based on the analysis of vulnerability and configuration data.
- Document and escalate incidents (including event’s history, status, and potential impact for further action); recommend mitigations that will have immediate impact to the environment.
- Perform after-action reviews of team products to ensure completion of analysis.
- Lead and mentor team members as a technical expert.