Phoenix Cyber is looking for Vulnerability Management Analysts to support a government client. This position in onsite in Columbus, OH.
Job Responsibilities:
- Serves as vulnerability management analyst for assigned information systems and computer networks.
- Analyzes vulnerabilities and characterizes risk to networks, operating systems, applications, databases, and other information system components.
- Engages with stakeholders and mission partners to facilitate vulnerability discovery through manual review and/or the use of vulnerability scanners.
- Facilitates the coordination of remediation efforts, prioritizing remediation efforts based on risk.
- Recommends appropriate actions to remediate vulnerabilities and mitigate risks and ensures the implementation of appropriate security settings to include those required by Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG).
- Supports and ensures compliance with DOD Information Assurance Vulnerability Management (IAVM) program.
- Tracks and reports security and compliance issues.
Minimum Experience:
- Five (5) years relevant experience
- Required to possess a DOD SECRET Clearance
- DoD Approved 8570 Baseline Certification: Category IAM Level II
- Hands-on experience working with vulnerability scanners
- Understanding of vulnerabilities and remediation techniques
Phoenix Cyber is a national provider of cybersecurity engineering services, operations services, sustainment services and managed security services to organizations determined to strengthen their security posture and enhance the processes and technology used by their security operations team.
Phoenix Cyber is an equal opportunity employer and complies with Executive Order 11246, Section 503 of the Rehabilitation Act of 1973, the Vietnam Era Veteran's Readjustment Assistance Act (VEVRAA), all amendments to these regulations, and applicable executive orders, federal, and state regulations. Applicants are considered without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, and/or veteran status.
Phoenix Cyber participates in E-Verify to confirm the employment eligibility of all newly-hired employees. To learn more about E-Verify, including your rights and responsibilities, go to https://www.e-verify.gov/
Top Skills
What We Do
Phoenix Cyber is a national provider of cybersecurity engineering, operations, and sustainment services to enterprise and government organizations determined to strengthen their security posture and enhance the processes and technology used by their security operations center. Our team comprises senior cybersecurity consultants and engineers with expertise in architecting results-oriented, cybersecurity frameworks; and the operational processes to ensure accurate incident detection, enrichment, and response. Our unique blend of security automation, orchestration, and proven best practices differentiates Phoenix-architected solutions from traditional cybersecurity services.
Cybersecurity Services
- Security Engineering (plan, architect, design, implement, integrate, document, and optimize)
- Security Operations (identify, protect, detect, respond, recover processes and best practices)
- Sustainment Services (manage, maintain, update, upgrade, optimize, support)
- Federal Government Services (contracts with U.S. Navy, FAA, DLA, and CIO-SP3)
Capabilities
- Data Protection
- Endpoint Security
- Network Security
- Perimeter Security
- Phishing Detection and Response
- Security Orchestration, Automation, and Response (SOAR)
- SIEM
- Threat Intelligence
- Threat Hunting
Security Tools
AWS, Microsoft, Swimlane, UiPath