Tech Stack
Cyber SecurityLinuxVMware
About the role
- Work with agile development teams to review application risks, identify weaknesses, and implement remediation actions
- Conduct security and vulnerability scans and application security testing
- Configure and manage Tenable Security Center and Nessus Manager (on-premises ACAS)
- Administer and maintain McAfee ePolicy Orchestrator (ePO) and Enterprise Security System (ESS)
- Monitor security logs and alerts from Elastic and Kibana (ELK Stack) and system-level audits
- Support incident detection and perform preliminary response actions to security incidents
- Configure and launch STIG compliance scans using SCAP Compliance Checker (SCC)
- Administer Microsoft Windows Server and Red Hat Linux (RHEL) operating systems
- Administer virtualization platforms using VMware and Microsoft Hyper-V
- Monitor, assess, and report system security vulnerabilities and document corrective actions on the POA&AM
- Identify and evaluate emergent cybersecurity technologies and systems engineering methods to improve system cybersecurity posture
- Test patches and fixes to ensure cybersecurity compliance prior to installation
- Perform other duties as assigned
Requirements
- Configure and manage Tenable Security Center and Nessus Manager in an on-premises environment as part of DISA Assured Compliance and Assessment Solution (ACAS)
- Administer and maintain McAfee ePolicy Orchestrator (ePO) and Enterprise Security System (ESS) point products
- Monitor security logs and alerts from Elastic and Kibana (ELK Stack) and other system level audits
- Support incident detection and conduct preliminary response actions to security incidents
- Configure and launch STIG compliance scans using SCAP Compliance Checker (SCC)
- Administer Microsoft Windows Server and Red Hat Linux (RHEL) operating systems
- Administer virtualization platforms using VMware and Microsoft Hyper-V
- Monitor, assess, and report system security vulnerabilities, document corrective actions on the POA&AM, and implement preventative actions
- Identify and analyze emergent cybersecurity technologies and systems engineering methods to improve cybersecurity posture
- Perform testing of all patches and fixes to ensure cybersecurity compliance prior to installation
- Experience in implementing and enforcing application cybersecurity and vulnerability management
- Bachelor’s degree in Cybersecurity, Information Technology, Computer Science or related field; or equivalent combination of education and experience
- Three (3) years or more of Cybersecurity related experience (hands on security engineering)
- Assured Compliance Assessment Solution (ACAS) experience is mandatory
- Experience conducting Information Systems vulnerability assessment, risk mitigation, and application of mitigation strategies
- Understanding of RMF, eMASS, POA&AMs, ACAS, and Vulnerability Management
- DoD 8570 IAT II or IAM II Certified (Security+ CE or equivalent) required at higher
- Active Secret clearance required