Job description
Requires preemptive actions to identify, remediate, and mitigate vulnerabilities to prevent exploitation. Receives vulnerability input, direction, and guidance from multiple sources and takes directed action to effectively mitigate vulnerabilities in order to protect networks. Leverages an operational understanding of current vendor remediation’s to prioritize vulnerability escalation procedures. Integrates continuous monitoring to ensure mitigations fall within prescribed timelines. NOTE: This position may include shift cycles.
Required Skills
- Knowledge of cyber threats and vulnerabilities.
- Determine overall Common Vulnerabilities and Exposures (CVE) priority when threat activity is identified; report incidents that may cause immediate and/or ongoing impact to the environment.
- Monitor and provide periodic system owners vulnerability mitigation completion updates.
- Knowledge of system and application security threats, vulnerabilities, and cyber attackers.
- Monitor external data sources to determine which security issues may have an impact on the enterprise.
- Identify, develop, and determine mitigation or remediation actions for system and network vulnerabilities.
- Communicate written and verbal information in a timely, clear, and concise manner.
- Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
- Knowledge of system administration, network, operating system hardening techniques, and the risk management process.
- Knowledge of specific operational impacts of cybersecurity lapses and organization's threat environment.
- Recommend impact/risk assessments to identify systemic security issues based on the analysis of vulnerability and configuration data.
- Document and escalate incidents (including event’s history, status, and potential impact for further action); recommend mitigations that will have immediate impact to the environment.
- Perform after-action reviews of team products to ensure completion of analysis.
- Lead and mentor team members as a technical expert.
QUALIFICATIONS Four (4) years of relevant experience is required. Candidate may substitute a Bachelor’s degree for two (2) experiential years. Two (2) years of experience of technical reporting. Two (2) years of experience in network and threat analysis.
CERTIFICATIONS & TECHNICAL PROFICIENCIES Requires DoD 8570 compliance Information Assurance Technical (IAT) Level I (possess one: A+ CE, CCNA-Security, CND, Network+ CE, SSCP) or Level II (possess one: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP) certification. Computing Environment (CE) certification requirement can be fulfilled with either Microsoft OS, Cent OS/Red Hat OS CE certifications. Requires successful completion of the Splunk software training course "Fundamentals 1".
About Black Eagle Defense
Black Eagle Defense is a Maryland-based small business that provides Information Technology, Cybersecurity, and related Consulting Services to the private and public sectors. Our team is composed of highly trained professionals with a commitment to continued learning, versatility, and adaptability within the ever-evolving technological landscape.
We are proud to be an Equal Employment Opportunity and Affirmative Action employer.
colinoncars.com is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, colinoncars.com provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, colinoncars.com is the ideal place to find your next job.