Powder River Industries

Vulnerability Analyst

Powder River Industries

full-time

Posted on:

Origin:  • 🇺🇸 United States

Visit company website
AI Apply
Manual Apply

Job Level

Mid-LevelSenior

Tech Stack

Cyber SecurityJavaScriptKubernetesLinuxSplunkUnix

About the role

  • Support vulnerability remediation efforts for the DMDC IT GEMS engagement
  • Perform trend and analysis of vulnerability scan data and prepare weekly metrics for presentation to leadership
  • Collaborate with technical and compliance teams across the organization
  • Manage and configure operating systems, networks, and software related to vulnerability management
  • Apply DISA STIGs and IAVM program guidance to harden systems
  • Use tools such as ACAS, PowerShell, MECM, Tanium, MDE, StackRox, and Splunk as applicable

Requirements

  • Secret Clearance Required
  • 5+ years of operational experience in vulnerability management or security engineering
  • Working knowledge of OS hardening/compliance/DISA STIGs
  • Position requires 8570 Certification (e.g. Security +, CISSP)
  • Working knowledge of ACAS
  • Knowledge of PowerShell
  • Experience with MECM, Tanium, and MDE a plus
  • Understanding of DISA STIGs and Information Assurance Vulnerability Management (IAVM) Program
  • Working knowledge of Red Hat Advanced Cluster Security for Kubernetes (StackRox) and Splunk strongly desired
  • Strong critical thinking, communication, and organizational skills
  • Collaborates with technical and compliance teams across the organization
  • Capable of performing trend and analysis of vulnerability scan data and preparation of weekly metrics for presentation to leadership
  • Experience in Information Technology/Vulnerability Management/Cybersecurity
  • Demonstrate deep technical knowledge in the management and configuration of operating systems, networks, and software including knowledge of OS authentication mechanisms, permissions, and a solid understanding of networking
  • In-depth knowledge of network protocols, operating systems, and common vulnerabilities
  • Familiarity with security frameworks and standards (e.g., NIST, ISO 27001)
  • Demonstrate broad security experience, which must include vulnerabilities, risks, and security mechanisms that are common in today's government systems
  • Successful completion of drug test and background investigation by the Federal government may be required
  • May require counterintelligence-scope polygraph examination