Apply

Ready to go for it?

AI Apply speeds things up—apply directly if you prefer.

Apply faster with JobTailor

Recommended
Apply

Apply your way

Use the standard apply link, or let JobTailor help you move faster.

  • Apply directly in one click
  • No setup required
  • Best if you’re in a hurry
Start AI Apply
True Zero Technologies, LLC

Vulnerability Management Analyst

True Zero Technologies, LLC

. Support vulnerability management activities by identifying, analyzing, and prioritizing vulnerabilities across client systems, applications, and networks .

Posted 4/20/2026full-timeRemote • District of Columbia, Maryland, Virginia, Washington • 🇺🇸 United StatesMid-LevelSeniorWebsite

Tech Stack

Tools & technologies
CloudCyber Security

About the role

Key responsibilities & impact
  • Support vulnerability management activities by identifying, analyzing, and prioritizing vulnerabilities across client systems, applications, and networks
  • Translate scan results and cyber hygiene findings into actionable remediation guidance
  • Coordinate with stakeholders to track resolution efforts
  • Help strengthen the organization’s overall security posture
  • Initiate or coordinate vulnerability scans using approved tools
  • Review and analyze scan results to identify weaknesses and security gaps
  • Assess risk and prioritize remediation activities based on severity, impact, and likelihood
  • Track remediation progress and support reporting to leadership and stakeholders
  • Review cyber hygiene findings and develop actionable recommendations
  • Coordinate with system owners, engineers, and administrators to support remediation efforts
  • Monitor emerging vulnerabilities, threat activity, and high-risk exposures that may affect client systems
  • Support security review of new technologies, applications, and software introduced into the environment
  • Help maintain vulnerability metrics, dashboards, and reporting outputs
  • Support process improvement and automation efforts related to vulnerability identification and tracking
  • Assist with documentation, status reporting, and stakeholder communications as needed

Requirements

What you’ll need
  • Experience using vulnerability scanning tools such as Tenable/Nessus or comparable platforms
  • Familiarity with enterprise operating systems, networks, cloud platforms, and applications
  • Working knowledge of CVE, CVSS, NVD, and CISA KEV
  • Experience analyzing findings and translating technical results into prioritized remediation actions
  • Experience coordinating with technical stakeholders to track and validate remediation
  • Ability to produce clear written reporting and communicate technical risk effectively
  • Familiarity with federal cybersecurity, compliance, or risk-based security operations environments preferred
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field; or equivalent experience
  • 3+ years of experience in vulnerability management, security operations, system security, or related work
  • Clearance Required: Public Trust or ability to obtain and maintain required DHS suitability/access
  • Preferred Certifications: CASP, GSEC, GSLC, CISSP, CEH, CISM, CISA, PMI-ACP, SAFe Agilist, CSM, or comparable certifications

Benefits

Comp & perks
  • Competitive salary, paid twice per month
  • Best in class medical coverage
  • 100% of medical premiums covered by True Zero
  • Company wide new business incentive programs
  • Contribution Incentives (i.e. white papers, blog posts, internal webinars, etc.)
  • 3 weeks of PTO starting + 11 Paid Holidays Annually
  • 401k Program with 100% company match on the first 4%
  • Monthly reimbursement of Cell Phone and Home Internet costs
  • Paternity/Maternity Leave
  • Investment in training and certifications to broaden and deepen your technical skills

ATS Keywords

✓ Tailor your resume
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
vulnerability managementvulnerability scanningrisk assessmentremediation guidancecyber hygieneCVECVSSNVDCISA KEVsecurity operations
Soft Skills
communicationstakeholder coordinationreportingdocumentationprocess improvementanalytical skillsprioritizationtechnical risk communicationteam collaborationproblem-solving
Certifications
CASPGSECGSLCCISSPCEHCISMCISAPMI-ACPSAFe AgilistCSM