1,946 Security Auditing jobs in the United States

Vulnerability Assessment Analyst

77246 Houston, Texas 360 Adept, LLC

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy; measures effectiveness of defense-in-depth architecture against known vulnerabilities; analyzes cyber defense policies and configurations and evaluates compliance with regulations and organizational directives; conducts and/or supports authorized penetration testing on enterprise network assets; maintains knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing; prepares audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions; performs technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications); makes recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes).

Education: Bachelor's Degree in Computer Information or Information Technology, Cybersecurity or Information Assurance or equivalent work experience of 5 or more years.

Certifications: GIAC Systems and Network Auditor (GSNA), GIAC Critical Controls Certification (GCCC)

#J-18808-Ljbffr
View Now

Vulnerability Assessment Analyst

22161 Springfield, Virginia CALIBRE Systems

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description

CALIBRE is an employee-owned mission focused solutions and digital transformation company. We are currently seeking a Vulnerability Assessment Analyst to support work we are doing in Springfield, VA. This position will be on site. This position performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.

Additional duties:

• Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.

• Conduct and/or support authorized penetration testing on enterprise network assets.

• Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.

• Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.

• Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.

• Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews (TSCM), TEMPEST countermeasure reviews).

• Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network UNCLASSIFIED 96 UNCLASSIFIED and infrastructure, enclave boundary, supporting infrastructure, and applications).

• Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes).

Required Skills

• Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.

• Skill in assessing the robustness of security systems and designs.

• Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).

• Skill in mimicking threat behaviors.

• Skill in the use of penetration testing tools and techniques.

• Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.).

• Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.).

• Skill in reviewing logs to identify evidence of past intrusions.

• Skill in conducting application vulnerability assessments.

• Skill in performing impact/risk assessments.

• Skill to develop insights about the context of an organization's threat environment

• Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

• Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.

• Ability to apply programming language structures (e.g., source code review) and logic.

• Ability to share meaningful insights about the context of an organization's threat environment that improve its risk management posture.

• Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Required Experience

• Knowledge of computer networking concepts and protocols, and network security methodologies.

• Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

• Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.

• Knowledge of cybersecurity and privacy principles.

• Knowledge of cyber threats and vulnerabilities.

• Knowledge of specific operational impacts of cybersecurity lapses.

• Knowledge of application vulnerabilities.

• Knowledge of cryptography and cryptographic key management concepts

• Knowledge of data backup and recovery.

• Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).

• Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

• Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).

• Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol (TCP) and Internet Protocol (IP), Open System Interconnection Model (OSI), Information Technology Infrastructure Library, current version (ITIL)).

• Knowledge of programming language structures and logic.

• Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language (PL/SQL) and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

• Knowledge of systems diagnostic tools and fault identification techniques.

• Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities.

• Knowledge of interpreted and compiled computer languages.

• Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).

• Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).

• Knowledge of system administration, network, and operating system hardening techniques.

• Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). K0179: Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

• Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

• Knowledge of ethical hacking principles and techniques. K0210: Knowledge of data backup and restoration concepts.

• Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.

• Knowledge of infrastructure supporting information technology (IT) for safety, performance, and reliability.

• Knowledge of an organization's information classification program and procedures for information compromise.

• Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).

• Knowledge of cryptology.

• Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. K0342: Knowledge of penetration testing principles, tools, and techniques.

• Knowledge of an organization's threat environment.

• Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)

Must haves:

• Current/Active TS/SCI security clearance

• 4+ years experience

• IAT Level 2 Certification (Comp TIA Security+ or CCNA or CISSP

• Two Penetration Testing Certifications (e.g., GPEN, GWAT, GCIH, CEH, GPYC, LPT, CPT)
View Now

Vulnerability Assessment Analyst III

20022 Washington, District Of Columbia Agile Defense

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

At Agile Defense we know that action defines the outcome and new challenges require new solutions. Thats why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.

Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agilityleveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nations vital interests.

Requisition #:

Job Title: Vulnerability Assessment Analyst III|Exempt

Job Title for Careers Page: Senior Tenable Security Engineer

Location: 14th and C Streets, SW Washington D.C., District of Columbia 20228 AND/OR 9000 Blue Mound Road, Fort Worth, TX 76131

Clearance Level: Active DoD -

Required Certification(s):

Tenable Vulnerability Management, Tenable Security Center, or Tenable OT Security certification is required.

CISSP or equivalent is required

SUMMARY: The Bureau of Engraving and Printings (BEP's) core mission is to design and manufacture high-quality security documents that meet customers' requirements for quality, quantity, and performance, as well as counterfeit deterrence. This position will serve as the Subject Matter Expert leading the development, improvement, integration, deployment, and ongoing maintenance of BEPs Vulnerability Management solution.

JOB DUTIES AND RESPONSIBILITIES

Design, develop, and customize Tenable security solutions to align with organizational security requirements and compliance needs.

Create and optimize vulnerability scanning policies, configurations, and dashboards to ensure comprehensive coverage of assets.

Continuously assess and enhance the effectiveness of Tenable tools by analyzing scan results, identifying gaps, and recommending improvements.

Update and refine scanning templates, asset groups, and vulnerability prioritization to reduce false positives and improve accuracy.

Stay updated on emerging threats, vulnerabilities, and Tenable product updates to incorporate best practices and new features.

Integrate Tenable solutions with other security tools and platforms, such as SIEM (e.g., Splunk, QRadar), ticketing systems (e.g., ServiceNow), and endpoint detection tools, to create a cohesive security ecosystem.

Plan and execute the deployment of Tenable solutions across multiple environments, ensuring minimal disruption to operations.

Monitor and maintain Tenable systems to ensure optimal performance, availability, and accuracy of vulnerability data.

Perform regular updates, patches, and upgrades to Tenable tools to address new vulnerabilities and maintain compliance.

Serve as the primary point of contact for Tenable-related queries, providing guidance to security teams, IT staff, and leadership.

Generate and present detailed vulnerability reports, metrics, and risk assessments to technical and non-technical audiences.

QUALIFICATIONS

Required Certifications

Tenable Vulnerability Management, Tenable Security Center, or Tenable OT Security certification is required.

CISSP or equivalent is required

Education, Background, and Years of Experience

Bachelors degree in Computer Science, IT, Business, Management, or related discipline from an accredited institution.

10 or more years experience in Bachelor's degree discipline. 8 or more years of experience with Tenable engineering and implementation.

ADDITIONAL SKILLS & QUALIFICATIONS

Required Skills

Experience with the administration of information systems.

Experience managing and leading technical projects.

Experience working in a cybersecurity program.

WORKING CONDITIONS

Environmental Conditions

Standard office building working within a cube and near co-workers.

Strength Demands

Sedentary 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.

Physical Requirements

Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; See

Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.

What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.

We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.

Happy - Be Infectious.

Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.

Helpful - Be Supportive.

Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.

Honest - Be Trustworthy.

Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.

Humble - Be Grounded.

Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.

Hungry - Be Eager.

Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.

Hustle - Be Driven.

Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities

#J-18808-Ljbffr
View Now

Vulnerability Assessment Solutions Administrator

20780 Hyattsville, Maryland Leidos

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Description

The Leidos Digital Modernization group is looking for a Vulnerability Assessment Solutions Administrator . This exciting role focuses on managing and optimizing the ACAS (Assured Compliance Assessment Solution) system, a vital tool for vulnerability assessment and security auditing, particularly within the Department of Defense. You will ensure the system operates at its best, analyze scan results, and collaborate with various teams to address identified vulnerabilities.

If you thrive in a dynamic environment and want to make a significant impact, read on!

Leidos Digital Modernization Sector is dedicated to delivering enterprise IT, digital modernization, and cyber capabilities to meet essential operational and mission objectives for the Air Force, Space Force, and Defense Agencies.

Position Responsibilities:

  • Proactively mitigate information risk by ensuring proper security, monitoring, and operation of Security Center servers and logs across NIPRNet and SIPRNet environments.

  • Identify and secure ECAS Scanner servers and maintain operations within the CONUS theater.

  • Conduct ACAS Agent scans and differential scans adhering to DISA best practices.

  • Collaborate with subscriber sites to facilitate the Cyber Operational Readiness Assessment (CORA) process.

  • Ensure the integrity of the operating system environment, focusing on SecurityCenters and Nessus scanners.

  • Report compliance data to senior management in response to directives and taskings.

  • Maintain effective communication with IT administration teams supporting both Cloud and on-premise server infrastructure.

  • Associate Nessus scanners with the correct scan zones and repositories to enhance efficiency.

  • Provide multi-tiered ACAS administrator support to various stakeholders.

  • Troubleshoot application errors, operating systems, server hardware, network communications, and storage issues within the ACAS environment.

  • Utilize diagnostic tools and logs to identify and resolve technical problems swiftly.

  • Employ the Atlassian Suite to track issues impacting system operations and suggest corrective actions.

  • Review system logs to identify scanning problems and recommend effective corrective measures.

  • Continuously evaluate current ACAS implementations for scans, assets, analyses, and permissions.

  • Assist in installing and maintaining configuration files, custom scan policies, plug-ins, and DISA STIGs to enhance vulnerability discovery capabilities.

  • Plan, document, and coordinate the implementation of updated processes and best practices for ACAS operations and maintenance.

Basic Qualifications:

  • Bachelor's degree with 8+ years of relevant experience, with consideration for extensive experience in lieu of a degree.

  • Possess one professional certification as outlined in DISA IASE IAT Level II DoD 8570.01 Approved Baseline and one Cyber Security Service Provider baseline certification before employment.

  • DISA ACAS certification is required.

  • Familiarity with the Cyber Operational Readiness Assessment (CORA) process is preferred.

  • Knowledge of VPN and Active Directory functionality.

  • Excellent communication skills, both written and verbal, with strong team collaboration abilities.

  • Understanding of imaging processes for PCs and Laptops, and basic authentication and IP CIDR setups.

  • Ability to work effectively within a dynamic cross-organizational team.

  • U.S. Citizenship is required, along with an active Secret clearance.

  • Strong troubleshooting skills for diagnosing and managing desktop software and hardware issues.

Ready to break things (in a good way) and build them smarter? Join us at Leidos!

Original Posting: August 8, 2025

For U.S. Positions: This job requisition will remain open for at least 3 days, closing no sooner than 3 days after the original posting date.

Pay Range:

Pay Range $104,650.00 - $189,175.00

This pay range serves as a guideline only and does not guarantee compensation. Additional factors include job responsibilities, education, experience, skills, internal equity, and applicable laws.

View Now

Vulnerability Assessment Analyst - Intermediate

63010 Manchester, Missouri Rividium Inc

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

Full-Time/Part-Time
Full-Time

Description

RiVidium Inc (dba, TripleCyber) is seeking a Vulnerability Assessment Analyst who performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.

TASKS:
  • Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.
  • Conduct and/or support authorized penetration testing on enterprise network assets.
  • Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
  • Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
  • Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.
  • Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews (TSCM), TEMPEST countermeasure reviews).
  • Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).
  • Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes).
ABILITIES:
  • Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
  • Skill in assessing the robustness of security systems and designs.
  • Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).
  • Skill in mimicking threat behaviors.
  • Skill in the use of penetration testing tools and techniques.
  • Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.).
  • Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.).
  • Skill in reviewing logs to identify evidence of past intrusions.
  • Skill in conducting application vulnerability assessments.
  • Skill in performing impact/risk assessments.
  • Skill to develop insights about the context of an organization's threat environment
  • Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Requirements:
  • Bachelor degree or higher from an accredited college or university
    • Prefer an accredited Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field.
  • Certifications: IAT Level 2 and Two Penetration Testing Certifications (e.g., GPEN, GWAT, GCIH, CEH, GPYC, LPT, CPT).


About the Organization
Established in 2008, RiVidium, Inc. (dba TripleCyber) is a VA-Verified SDVOSB and an SBA-Certified 8(a) company. To prepare our clients for the future, RiVidium has balanced all parts of our organization to attract the finest employees in order to 'Strive to be the missing element defining tomorrow's technology'. RiVidium keeps pace and surpasses its competitors by meeting challenges of advancements in Logistics, Human Capital, Cyber, Intelligence & Technology.

EOE Statement
We are an equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status or any other characteristic protected by law. If you need a reasonable accommodation for any part of the employment process, please contact Human Resources (HR) at

This position is currently accepting applications.
View Now

Senior Vulnerability Assessment Specialist

14211 Buffalo, New York M&T Bank

Posted 24 days ago

Job Viewed

Tap Again To Close

Job Description

_This role offers a hybrid work schedule at our Buffalo, NY Tech Hub._
**Overview:**
Responsible for conducting detailed analysis of vulnerabilities and recommendations on remediation plans to ensure the integrity and resilience of organization's security and information systems. Serves as senior experienced vulnerability analyst by auditing analysis and reports, serving as an escalation point, and training newer/less-experienced analysts.
**Primary Responsibilities:**
+ Refine testing methodologies for vulnerability scanning to provide comprehensive risk-based view of potential vulnerabilities and may lead implementation of new methodologies within team.
+ Create configuration scanning plans that ensure compliance with internal policies and best practices; lead configuration scanning of most systems and networks and build remediation plan for identified vulnerabilities.
+ Organize monitoring techniques to monitor database activities and performance and manage responses to detected issues with cross-functional team.
+ Lead analysis of active and network vulnerability scans to identify potential exploits, misconfigurations, and attacks; partner with cross-functional team to execute remediation plans.
+ In partnership with technology and risk, develop vulnerability management policies and standards and educate technology teams on how integrate into to developing, deploying, and monitoring infrastructure.
+ Design infrastructure testing frameworks that ensure technology teams are developing and deploying infrastructure in alignment with policies and standards.
+ Formulate and recommend advanced best practices to technology teams on how to improve or implement new security practices, tools, and techniques based on industry standards and latest vulnerabilities to protect the bank from vulnerabilities.
+ Produce and interpret advanced reporting with recommendations for cybersecurity and technology leadership, including but not limited to audit reports identifying technical and procedural findings, common vulnerability score, and datasets for regulatory reporting.
+ Understand and adhere to the Company's risk and regulatory standards, policies, and controls in accordance with the Company's Risk Appetite. Design, implement, maintain, and enhance internal controls to mitigate risk on an ongoing basis. Identify risk-related issues needing escalation to management.
+ Promote an environment that supports belonging and reflects the M&T Bank brand.
+ Maintain M&T internal control standards, including timely implementation of internal and external audit points together with any issues raised by external regulators as applicable.
+ Complete other related duties as assigned.
**Scope of Responsibilities:**
+ Partners with peers, manager, cybersecurity organization, technology teams, people leaders, and line of business teams
+ Determines and develops approach to solutions. Work is accomplished with periodic check-ins for alignment and limited direction. Work is evaluated upon completion to ensure objectives have been met.
+ Advanced knowledge of all vulnerability scanning and assessment tools
+ Advanced understanding of multiple vulnerability scanning and assessment tools
+ Subject matter expert understanding of industry best practices related to vulnerability and patch management.
+ Trains analyst to advanced level knowledge of vulnerability scanning and assessment tools, and industry best practices.
+ Second highest individual contributor escalation point in team
**Manager Responsibilities:**
No supervisory responsibilities.
**Education and Experience Required:**
+ Bachelor's degree and a minimum of 3 years' relevant work experience, or in lieu of a degree, a combined minimum of 7 years' higher education and/or work experience
+ Excellent written and verbal communication skills
+ Strong ability to effectively communicate technical information to both non-technical and technical stakeholders, including up to senior leadership in Cybersecurity.
+ Experience effectively collaborating with leadership and with peers across the organization.
+ Prior experience with and demonstrable aptitude for quickly learning new technical skills.
**Education and Experience Preferred:**
+ Advanced certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Global Information Assurance Certification (GIAC), OffSec Certified Professional (OSCP), or Cybersecurity domain-related industry-recognized certification (DoD Level II)
+ Demonstrated experience working in a highly regulated industry (e.g., finance, healthcare, government)
+ Experience evaluating, analyzing, and synthesizing large quantities of data (which may be fragmented and contradictory) and accurately determining the potential range and scope of threats and contributing towards intelligence reporting.
+ Proficient level of thinking critically and solving problems
+ Intermediate understanding of advanced vulnerability concepts and practices, such as vulnerability management solutions, asset identification and management, and mitigation management
+ Experience training analysts to ensure they have intermediate knowledge of and how to use security monitoring systems.
#LI-JB3
M&T Bank is committed to fair, competitive, and market-informed pay for our employees. The pay range for this position is $93,581.10 - $155,968.51 Annual (USD). The successful candidate's particular combination of knowledge, skills, and experience will inform their specific compensation.
**Location**
Buffalo, New York, United States of America
M&T Bank Corporation is an Equal Opportunity/Affirmative Action Employer, including disabilities and veterans.
View Now

TS/SCI Vulnerability Assessment Analyst

22151 Springfield, Virginia Insight Global

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description
Insight Global is looking for a TS/SCI Vulnerability Assessment Analyst in the Springfield, VA area. They will be supporting a customers cyber security team doing both technical and non technical risk and vulnerability assessments across systems, networks, and applications. They will conduct and support penetration testing on enterprise network assets. They will also monitor and interpret threat environments to inform risk strategies.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: and Requirements
TS/SCI
Bachelors Degree / or Prior Military experience
IAM or IAT ll certification
2 Penetration Testing Certifications (GPEN, GWAT, GCIH, CEH, GPYC, LPT, CPT)
- Experience in conducting vulnerability scans, penetration testing, and risk assessments.
- Experience analyzing logs, mimic threat behaviors, and apply cybersecurity principles to organizational needs.
- Experience identifying security issues and recommending cost-effective security controls. null
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment without regard to race, color, ethnicity, religion,sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military oruniformed service member status, or any other status or characteristic protected by applicable laws, regulations, andordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request to
View Now
Be The First To Know

About the latest Security auditing Jobs in United States !

Vulnerability Assessment (VA) Team Lead

20147 Ashburn, Virginia TekSynap

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

**Responsibilities & Qualifications**
**ACTIVITIES & RESPONSIBILITIES**
Assist the Government in managing Enterprise Information System Vulnerability Management (ISVM) compliance validation; briefing leadership on current and future vulnerabilities, security policies and industry standards; briefing leadership on most impactful vulnerabilities, configurations, and penetration testing efforts; creating and managing all scans in accordance with the scan standardization documentation; performing regularly scheduled (monthly and ad hoc) vulnerability assessments using a master schedule as directed; managing, customizing, and maintaining scan policies, zones, and repositories as they relate to the network; performing scan functions and review scan results to ensure accurate findings; and creating and customizing scan reports and data feeds to be imported / integrated into third party assessment tools. Assist the Government in employing ad hoc or emergency VA scanning to support targeted incident investigation, escalation, and emergency response to security events in accordance with documented procedures. Assist the Government in performing Penetration Testing Support.
**SKILLS**
+ Analyzing vulnerabilities and providing assessments and remediation instructions
+ Knowledgeable to maintain a repository of VA application issues and report application issues to Government VAT Team Lead and SSD Director in applying Information Systems Security principles and methods
+ Experience with Application Security implementation
+ Understanding of Firewall Management and Advanced Threat Protection
+ Familiarity with Access Control, Authorization, Intrusion Prevention and Intrusion Detection
+ Familiar with Protocol Analysis and requirements when handling sensitive and classified Information
+ Familiar with FISMA compliance and Risk Management Framework
+ Support Cyber Briefs for all vulnerability assessment team activities.
+ Assist the Government in providing Vulnerability Assessment, Compliance, and Reporting support to ISSO / ISSM interpreting scan results and recommend remediation plans.
+ Experience with cloud- based security technologies, architecture, and computing and searching, monitoring, and analyzing machine-generated big data is preferred.
**REQUIRED QUALIFICATIONS**
+ Clearance requirement: Secret
+ Experience: Minimum of 5 years' experience performing vulnerability assessments for an enterprise network
+ Education: Bachelor's of Science in computer engineering, computer science, IT or cyber security preferred (or 5 years of relevant work experience in lieu of a degree)
+ Certifications: one of the following certifications: Certified Information Security Manager (CISM) or Certified Information Systems Security Professional (CISSP)
**Overview**
We are seeking an experienced **Vulnerability Assessment (VA) Team Lead** in support of a government customer to join our team to provide Security Operations Support (SOC) Services to a government agency whose mission is to protect our Nation's borders from terrorist attacks, to provide law enforcement for over forty (40) Federal agencies, and to protect the revenue of the United States while facilitating trade. The SOC is a single point of management and reporting for information security incidents. The SOC exists to prevent, identify, contain, and eradicate cyber threats to networks through monitoring, intrusion detection, and protective security services to information systems, including local area networks / wide area networks (LAN / WAN), commercial Internet connection, public facing websites, wireless, mobile / cellular, cloud, security devices, servers, and workstations. The SOC is responsible for the overall security of Enterprise-wide information systems and collects, investigates, and reports any suspected and confirmed security violations.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at .
Apply now to explore jobs with us!
The safety and health of our employees is of the utmost importance. Employees are required to comply with any contractually mandated Federal COVID-19 requirements. More information can be foundhere ( .
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".
"As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration".
**Additional Job Information**
**WORK ENVIRONMENT AND PHYSICAL DEMANDS**
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
+ Location: Ashburn Virginia
+ Remote or In-Person: 100% On site. Remote/Telework not available.
+ Type of environment: Office
+ Noise level: Medium
+ Work schedule: Schedule is day shift Monday - Friday.
+ Amount of Travel: Some travel may be required
**PHYSICAL DEMANDS**
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
**WORK AUTHORIZATION/SECURITY CLEARANCE**
Top Secret (SCI eligible)
**OTHER INFORMATION**
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
**EQUAL EMPLOYMENT OPPORTUNITY**
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
**Job Locations** _US-VA-Ashburn_
**ID** _2025-8023_
**Category** _Technical Support/Help Desk_
**Type** _Regular Full-Time_
View Now

Vulnerability Assessment Analyst and Penetration Tester Contingent

28372 Whispering Pines, North Carolina Lumbee Holdings, Inc

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

Position Title

Vulnerability Assessment Analyst and Penetration Tester (Contingent)

Work Location

Camp Pendleton, CA

Position Description

The Vulnerability Assessment Analyst and Penetration Tester is responsible for the delivery of continuous cyber assessments, solving complex technology problems, building tools, and identifying and influencing response to and mitigation of threats. Perform manual assessment of systems, services, and software; specializing in security issues beyond those identified by static analysis tools. The individual ensures services, applications, and websites are designed and implemented to the highest security standards. Responsible for application and hardware penetration testing, automating repetitive tasks using various scripting languages, mentoring, and leading other engineers to deliver complex penetration tests and vulnerability assessments. The individual will be expected to drive automation, tooling, efficiency, and advance the teams penetration testing capabilities. Responsible for creating threat mitigation plans.

Minimum Position Requirements:

  • Five years of hands-on penetration testing experience with operating systems, web applications, and network infrastructure.

  • Administrator-level knowledge of Windows and Linux Server operating systems.

  • Experience with operating system security.

  • Competent with testing frameworks and tools, such as Burp Suite, Metasploit, Cobalt Strike, Kali Linux, Nessus, PowerShell Empire.

  • Knowledge of the functionality and capabilities of computer network defense technologies, including router Access Control Lists (ACLs), firewalls, Intrusion Detection System (IDS)/Intrusion Prevention System (IPS), antivirus/Endpoint Detection and Response (EDR), and web content filtering.

  • Strong written and verbal communication skills, including the ability to explain complex technical topics to non-technical audiences.

  • Possess one of the following certifications upon onboarding:

    • Offensive Security Certified Professional (OSCP)
    • Offensive Security Web Assessor (OSWA)
    • GIAC Web Application Penetration Tester (GWAPT)
    • GIAC Penetration Tester (GPEN)
    • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
    • Offsec Experienced Penetration Tester (OSEP)
    • Offsec Web Expert (OSWE)
  • Obtain one of the following certifications within 9 months of onboarding:

Reports To

Assigned Program Manager

Security Clearance Requirements

Secret

Travel Requirements

Travel is anticipated to be 10% - 15% within the Continental United States and 5%-10% outside the Continental United States

Benefits & Compensation

  • New employees are eligible to participate in the companys benefits plan on their day of hire unless
  • Medical Insurance
  • Vision & Dental Insurance
  • Long Term & Short-Term Disability, Group Life and AD&D Insurance 100% Employer Paid
  • Flexible Spending Plan
  • Health Savings Account
  • 401(k) Savings Plan 100% match for the first 3% contributed plus 50% of the next 2% contributed. (no vesting period and eligibility is your date of hire).
  • Paid holidays Eleven (11) per year
  • Paid Time Off - One hundred-twenty (120) accrued hours per year
  • Professional Development Program
  • Salary will be determined based on the individuals education and experience level

noted otherwise.

Overview

Lumbee Holdings is a leading provider of IT Support, Cybersecurity and Training and Development to the Department of Defense (DoD) and other government agencies. We are seeking a dynamic and experienced Business Development Manager to drive growth and expand our presence in the defense sector.

Equal Employment Opportunity Policy Statement

It is the policy of Lumbee Tribe Holdings, Inc. and its subsidiaries (the Company) not to discriminate against any employee or applicant for employment because of race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, marital status, genetic information, mental or physical disability (and medical condition, for employees in California) or because he or she is a protected veteran. It is also the policy of the Company to take affirmative action to employ and to advance in employment,

all persons regardless of race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, marital status, genetic information, mental or physical disability (and medical condition, for employees in California) or protected veteran status, and to base all employment decisions only on valid job requirements. This policy shall apply to all employment actions, including but not limited to recruitment, hiring, upgrading, promotion, transfer, demotion, layoff, recall, termination, rates of pay or other forms of compensation and selection for training, including apprenticeship, at all levels of employment.

Employees and applicants of the Company will not be subject to harassment on the basis of race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, marital status, genetic information, mental or physical disability (and medical condition, for employees of California) or because he or she is a protected veteran. Additionally, retaliation, including intimidation, threats, or coercion,

because an employee or applicant has objected to discrimination, engaged or may engage in filing a complaint, assisted in a review, investigation, or hearing or have otherwise sought to obtain their legal rights under any Federal, State, or local EEO law is prohibited.

NOTE: These statements are intended to describe the general nature and level of work involved for this job. It is not an exhaustive list of all responsibilities, duties, and skills required of this job.

#J-18808-Ljbffr
View Now

Vulnerability Assessment Scans for Entity in Annapolis, MD

20721 Woodmore, Maryland MANAGEMENT APPLICATIONS, INC.

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

Vulnerability Assessment Scans for Entity in Annapolis, MD

Management Applications, Inc., a leading provider of Managed IT Services and Network Design and Implementation is seeking IT Professionals for positions with an entity in Annapolis, MD. Please submit a resume and salary requirements to be considered.

Background

Entity is located in Annapolis, Maryland. Entity provides network infrastructure and managed security for Maryland Government Entity. The network infrastructure is designed to provide the users with connectivity to the Entity's network. Entity Network Infrastructure comprises:

(1) Servers
  • Wintel servers that use Active Directory (AD) directory service to manage identities and relationships
  • UNIX servers that are LDAP compliant
  • RADIUS servers

(2) Storage Area Network (SANs) devices and Network-Attached Storage (NAS) systems

(3) Cisco routers

(4) Cisco switches

(5) Load balancers

(6) Security provided by Cisco firewalls and intrusion detection systems (IDSs)

Job Responsibilities and Experience Requirements
  1. Perform a credentialed scan of no more than 1500 systems.
  2. Analyze scans to identify network & desktop vulnerabilities using COBIT 5 standards as a measurement;
  3. Report the vulnerability immediately upon discovery of a critical vulnerability and recommend remedial steps within one (1) business day following discovery;
  4. Submit a written report that:
    • Identifies vulnerability gaps
    • Recommends remedial steps required to bring the environment up to COBIT 5 standards;
  5. Formally present findings to Entity Management.


Background Check

Must be able to pass Criminal Justice Information System (CJIS) State and Federal criminal background check, including fingerprinting.

Possible Positions Available

Systems Analyst

Job Application Instructions:

To be considered for these positions please submit a resume (2 page max.) as well as minimum salary requirements . Please prominently feature the skills described above within the resume you submit. YOU MUST SUBMIT YOUR MINIMUM SALARY REQUIREMENTS. RESUMES WITHOUT MINIMUM SALARY REQUIREMENTS WILL NOT BE CONSIDERED.
View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Auditing Jobs