Location: Springfield,VA, USA
To acquire this advantage, Zolon seeks a Vulnerability Assessment Analyst in Springfield, VA.
Position Overview:
Work Role Description Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
Duties:
Analyze the organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.
Conduct or support authorized penetration testing on enterprise network assets.
Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents related to cyber defense auditing.
Prepare audit reports identifying technical and procedural findings and recommend remediation strategies/solutions.
Conduct required reviews as appropriate within the environment (e.g., Technical Surveillance, Countermeasure Reviews [TSCM], TEMPEST countermeasure reviews).
Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).
Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems, and processes)
Requirement:
Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
Skill in assessing the robustness of security systems and designs.
Skill in detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort).
Skill in mimicking threat behaviors and use of penetration testing tools and techniques.
Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.).
Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.).
Skill in reviewing logs to identify evidence of past intrusions.
Skill in conducting application vulnerability and performing impact/risk assessments.
Skill to develop insights about the context of an organization's threat environment.
Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Education: Bachelor's degree in cybersecurity or IT-related field
Required Clearance: TS/SCI
Required Certification: IAT Level 2 and Two Penetration Testing Certifications w/ At Least One Being an Advanced Certification (e.g., OSCP, OSCE, OSEE, GSE, GXPN, CPT)