Cybersecurity Vulnerability Analyst (Incident Manager III)

Reposted 10 Days Ago
Arlington, VA
In-Office
Senior level
Information Technology • Consulting
The Role
The Cybersecurity Vulnerability Analyst will analyze vulnerabilities, assess risks, coordinate cybersecurity operations, and contribute to incident management efforts in federal cybersecurity.
Summary Generated by Built In
Title: Cybersecurity Vulnerability Analyst (Incident Manager III)
Description: 
Solutions³ LLC is supporting our prime contractor and their U.S. Government customer to provide cybersecurity vulnerability analysis support to reduce the prevalence and impact of vulnerabilities and exploitable conditions across Federal Civilian Executive Branch (FCEB) entities and Critical Infrastructure Key Resources (CIKR).
    
Solutions³ LLC is seeking a Cybersecurity Vulnerability Analyst to support this critical mission by utilizing cybersecurity best practices, risk management techniques, critical thinking, and strong analytical skills to analyze information from multiple sources, synthesize that information, and provide expert analysis to senior customer stakeholders.
Eligibility: 
  • Must be a US Citizen 
  • Must have an active TS/SCIclearance
  • Must be able to obtain DHS Suitability prior to starting employment  
  • 5+ years of directly relevant experience
Responsibilities Include: 
  • Utilize creativity and divergent thinking to assess and explain the impact of cybersecurity vulnerabilities on FCEB and CIKR security postures 
  • Conduct prevalence and sector analysis of vulnerabilities with Attack Surface Management tools
  • Review vulnerability reporting to identify potential risks and impacts CIKR and FCEB entities
  • Maintain awareness of technical capabilities of Vulnerability Management (VM) Subdivision operational components
  • Evaluate technical requirements of VM operational components and recommend paths forward
  • Understand and articulate the impact of vulnerabilities to organizations
  • Coordinate with VM analysts and leadership to synchronize VM operational activities
  • Coordinate with broader Cybersecurity Division (CSD) analysts and leadership to understand CSD operational priorities and activities
  • Willingness, ability, and flexibility to assist the government to standup this new mission operations area within VM
  • Demonstrated ability to contribute to developing Standard Operating Procedures and Work Instructions as required
  • Demonstrated ability to contribute to weekly operation summaries, intelligence analysis summaries, and other cyber intelligence reports
Required Skills: 
  • Experience as a hands-on cybersecurity analyst (i.e. SOC Analyst or Penetration Tester) is required
  • Experience with the analysis and characterization of cyber attacks
  • Skilled in identifying different classes of attacks and attack stages
  • Knowledge of system and application security threats and vulnerabilities
  • Knowledge of basic networking protocols, including TCP/IP, UDP, HTTP/HTTPS, SSH, and DNS, and open security standards and projects, including OWASP
  • Knowledge of CVSS and KEV scoring methodology
  • Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.)
  • Knowledge of VM scanning, Web Application scanning, and red team processes
  • Experience recognizing and categorizing types of vulnerabilities and associated attacks
  • Knowledge of Computer Network Defense policies, procedures, and regulations
  • Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non nation-state sponsored], and third generation [nation-state sponsored])
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code)
  • Experience in developing and delivering technical briefings
  • Must be able to work collaboratively across physical and virtual locations
Desired Skills:  
  • Understanding of OT/ICS/SCADA technologies and associated vulnerabilities
  • Experience with conducting all-source research
  • Understanding of MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK)
  • Experience with:
    • SharePoint
    • ServiceNow
    • Palo Alto Networks Cortex Xpanse
Desired Certifications: CompTIA Security+, CEH, CISSP, CISM, CISA, CCSP, CIPP, CPT, CCSS
Required Education: BS Computer Science, Computer Engineering, Computer Information Systems, Cybersecurity or related degree. HS Diploma with 7+ years of cyber incident management or cybersecurity experience

Top Skills

Cvss
Cybersecurity Analysis
Dns
Http/Https
It Security Standards
Owasp
Palo Alto Networks Cortex Xpanse
Penetration Testing
Servicenow
Soc
Ssh
Tcp/Ip
Udp
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Wyckoff, New Jersey
11 Employees
Year Founded: 2003

What We Do

Who We Are:
Solutions³ is an award-winning consulting and training organization, providing full lifecycle IT Management solutions built on industry best practices. Our complete solution includes innovation, thought leadership, and market-leading applications, implemented by a highly qualified team. This collaborative methodology results in projects that are clearly defined and understood, and support our clients’ business objectives.

What We Do:
Solutions³ focuses on the architecture, implementation, and training of each solution we provide. Our unique training, led by instructors who are also practitioners, brings valuable experience into the classroom.

Our three-dimensional approach of people, process, and technology, combined with partner expertise, ensures that all aspects of the solution function effectively. We provide custom training to equip people with the knowledge and hands-on experience to manage their IT solutions, we enable business improvement with ITIL-based processes and best-of-breed technology, and our strong partner ecosystem allows us to address a broader range of IT needs.

Within our expertise areas, we provide assessments, component design, implementation plans, test plans, application deployment and integration, process and policy definition, knowledge transfer, custom end-user training, and ongoing operation and maintenance. These expertise areas include:

- Cybersecurity Training & Governance
- IT Service Management (Service Desk & ITIL®)
- IT Operations Management
- Critical Notification Systems
- Project Management
- Staff Augmentation

Similar Jobs

AMP Logo AMP

Shift Supervisor

Artificial Intelligence • Computer Vision • Greentech • Machine Learning • Robotics • Industrial • Automation
Easy Apply
Hybrid
Portsmouth, VA, USA
70K-79K

Mondelēz International Logo Mondelēz International

Senior Manager Supply Chain Excellence (TPM Regional Manager / Manufacturing Excellence)

Big Data • Food • Hardware • Machine Learning • Retail • Automation • Manufacturing
Remote or Hybrid
6 Locations
137K-189K Annually
Hybrid
Alexandria, VA, USA

Wells Fargo Logo Wells Fargo

Personal Banker Lexington

Fintech • Financial Services
Hybrid
Lexington, VA, USA

Similar Companies Hiring

Scrunch AI Thumbnail
Software • SEO • Marketing Tech • Information Technology • Artificial Intelligence
Salt Lake City, Utah
Amplify Platform Thumbnail
Fintech • Financial Services • Consulting • Cloud • Business Intelligence • Big Data Analytics
Scottsdale, AZ
62 Employees
Standard Template Labs Thumbnail
Software • Information Technology • Artificial Intelligence
New York, NY
10 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account