Vulnerability Management Analyst [JOB ID: 20241009]

Posted 22 Days Ago
Be an Early Applicant
Columbus, OH
1-3 Years Experience
Information Technology • Security • Cybersecurity
The Role
The Vulnerability Management Analyst will analyze vulnerabilities in information systems and networks, facilitating vulnerability discovery and remediation efforts. This role involves engaging with stakeholders to prioritize actions based on risk and ensuring compliance with various security programs.
Summary Generated by Built In

Phoenix Cyber is looking for Vulnerability Management Analysts to support a government client. This position in onsite in Columbus, OH. 

Job Responsibilities: 

  • Serves as vulnerability management analyst for assigned information systems and computer networks.
  • Analyzes vulnerabilities and characterizes risk to networks, operating systems, applications, databases, and other information system components.
  • Engages with stakeholders and mission partners to facilitate vulnerability discovery through manual review and/or the use of vulnerability scanners.
  • Facilitates the coordination of remediation efforts, prioritizing remediation efforts based on risk.
  • Recommends appropriate actions to remediate vulnerabilities and mitigate risks and ensures the implementation of appropriate security settings to include those required by Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG).
  • Supports and ensures compliance with DOD Information Assurance Vulnerability Management (IAVM) program.
  • Tracks and reports security and compliance issues.

Minimum Experience:

  • Five (5) years relevant experience
  • Required to possess a DOD SECRET Clearance
  • DoD Approved 8570 Baseline Certification: Category IAM Level II
  • Hands-on experience working with vulnerability scanners
  • Understanding of vulnerabilities and remediation techniques

Phoenix Cyber is a national provider of cybersecurity engineering services, operations services, sustainment services and managed security services to organizations determined to strengthen their security posture and enhance the processes and technology used by their security operations team.

Phoenix Cyber is an equal opportunity employer and complies with Executive Order 11246, Section 503 of the Rehabilitation Act of 1973, the Vietnam Era Veteran's Readjustment Assistance Act (VEVRAA), all amendments to these regulations, and applicable executive orders, federal, and state regulations. Applicants are considered without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, and/or veteran status.

Phoenix Cyber participates in E-Verify to confirm the employment eligibility of all newly-hired employees. To learn more about E-Verify, including your rights and responsibilities, go to https://www.e-verify.gov/

Top Skills

Vulnerability Management
The Company
HQ: Scottsdale, AZ
30 Employees
On-site Workplace
Year Founded: 2011

What We Do

Phoenix Cyber is a national provider of cybersecurity engineering, operations, and sustainment services to enterprise and government organizations determined to strengthen their security posture and enhance the processes and technology used by their security operations center. Our team comprises senior cybersecurity consultants and engineers with expertise in architecting results-oriented, cybersecurity frameworks; and the operational processes to ensure accurate incident detection, enrichment, and response. Our unique blend of security automation, orchestration, and proven best practices differentiates Phoenix-architected solutions from traditional cybersecurity services.

Cybersecurity Services
- Security Engineering (plan, architect, design, implement, integrate, document, and optimize)
- Security Operations (identify, protect, detect, respond, recover processes and best practices)
- Sustainment Services (manage, maintain, update, upgrade, optimize, support)
- Federal Government Services (contracts with U.S. Navy, FAA, DLA, and CIO-SP3)

Capabilities
- Data Protection
- Endpoint Security
- Network Security
- Perimeter Security
- Phishing Detection and Response
- Security Orchestration, Automation, and Response (SOAR)
- SIEM
- Threat Intelligence
- Threat Hunting

Security Tools
AWS, Microsoft, Swimlane, UiPath

Jobs at Similar Companies

Jobba Trade Technologies, Inc. Logo Jobba Trade Technologies, Inc.

Customer Success Specialist

Cloud • Information Technology • Productivity • Professional Services • Software
Remote
Hybrid
Chicago, IL, USA
45 Employees

Silverfort Logo Silverfort

Marketing Analyst

Information Technology • Sales • Security • Cybersecurity • Automation
Remote
United States
357 Employees

InCommodities Logo InCommodities

Senior Software Developer - NA

Information Technology • Machine Learning • Analytics • Energy • Automation • Renewable Energy
Hybrid
Austin, TX, USA
234 Employees

Similar Companies Hiring

Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
GB
357 Employees
Jobba Trade Technologies, Inc. Thumbnail
Software • Professional Services • Productivity • Information Technology • Cloud
Chicago, IL
45 Employees
InCommodities Thumbnail
Renewable Energy • Machine Learning • Information Technology • Energy • Automation • Analytics
Austin, TX
234 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account