Powder River Industries

Vulnerability Analyst

Powder River Industries

full-time

Posted on:

Origin:  • 🇺🇸 United States • District of Columbia, Washington

Visit company website
AI Apply
Apply

Job Level

Mid-LevelSenior

Tech Stack

Cyber SecurityJavaScriptKubernetesLinuxSplunkUnix

About the role

  • Support vulnerability remediation efforts for the DMDC IT GEMS engagement
  • Perform trend and analysis of vulnerability scan data and prepare weekly metrics for presentation to leadership
  • Collaborate with technical and compliance teams across the organization
  • Manage and configure operating systems, networks, and software; apply OS hardening/compliance and DISA STIGs
  • Use tools such as ACAS, PowerShell, MECM, Tanium, MDE, StackRox, and Splunk where applicable
  • Participate in information assurance and vulnerability management activities and reporting

Requirements

  • Secret Clearance Required
  • 5+ years of operational experience in vulnerability management or security engineering
  • Working in-depth knowledge of the Windows OS (Windows Workstation and Windows server)
  • Foundational knowledge of LINUX/UNIX OS, networking, databases, and other IT Technologies
  • Working knowledge of DevSecOps functionality a plus
  • 8570 Certification (e.g. Security +, CISSP) required
  • Working knowledge of ACAS
  • Knowledge of PowerShell
  • Experience with MECM, Tanium, and MDE a plus
  • Understanding of DISA STIGs and Information Assurance Vulnerability Management (IAVM) Program
  • Working knowledge of Red Hat Advanced Cluster Security for Kubernetes (StackRox) and Splunk strongly desired
  • Strong critical thinking, communication, and organizational skills
  • Collaborates with technical and compliance teams across the organization
  • Capable of performing trend and analysis of vulnerability scan data and preparation of weekly metrics for presentation to leadership
  • Experience in Information Technology/Vulnerability Management/Cybersecurity
  • Deep technical knowledge in the management and configuration of operating systems, networks, and software including knowledge of OS authentication mechanisms and permissions
  • In-depth knowledge of network protocols, operating systems, and common vulnerabilities
  • Familiarity with security frameworks and standards (e.g., NIST, ISO 27001)
  • Will be subject to drug testing, federal background investigation, and possibly counterintelligence-scope polygraph
  • Must verify identity and eligibility to work in the United States