Tech Stack
Cyber SecurityJavaScriptKubernetesLinuxSplunkUnix
About the role
- Support vulnerability remediation efforts for the DMDC IT GEMS engagement
- Perform trend and analysis of vulnerability scan data and prepare weekly metrics for presentation to leadership
- Collaborate with technical and compliance teams across the organization
- Manage and configure operating systems, networks, and software related to vulnerability management
- Apply DISA STIGs and IAVM program guidance to harden systems
- Use tools such as ACAS, PowerShell, MECM, Tanium, MDE, StackRox, and Splunk as applicable
Requirements
- Secret Clearance Required
- 5+ years of operational experience in vulnerability management or security engineering
- Working knowledge of OS hardening/compliance/DISA STIGs
- Position requires 8570 Certification (e.g. Security +, CISSP)
- Working knowledge of ACAS
- Knowledge of PowerShell
- Experience with MECM, Tanium, and MDE a plus
- Understanding of DISA STIGs and Information Assurance Vulnerability Management (IAVM) Program
- Working knowledge of Red Hat Advanced Cluster Security for Kubernetes (StackRox) and Splunk strongly desired
- Strong critical thinking, communication, and organizational skills
- Collaborates with technical and compliance teams across the organization
- Capable of performing trend and analysis of vulnerability scan data and preparation of weekly metrics for presentation to leadership
- Experience in Information Technology/Vulnerability Management/Cybersecurity
- Demonstrate deep technical knowledge in the management and configuration of operating systems, networks, and software including knowledge of OS authentication mechanisms, permissions, and a solid understanding of networking
- In-depth knowledge of network protocols, operating systems, and common vulnerabilities
- Familiarity with security frameworks and standards (e.g., NIST, ISO 27001)
- Demonstrate broad security experience, which must include vulnerabilities, risks, and security mechanisms that are common in today's government systems
- Successful completion of drug test and background investigation by the Federal government may be required
- May require counterintelligence-scope polygraph examination