
Vulnerability Analyst I
- Kuwait City
- Permanent
- Full-time
Responsibilities
- Conduct regular security assessments and audits of information systems with the DoD SWA network.
- Develop and implement action plans to manage common vulnerabilities and exposures.
- Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating.
- Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN.
- Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities.
- Recommend improvements to the overall cybersecurity posture.
- Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently.
- Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON.
- Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues.
- Additional requirements may vary depending upon location.
- Performs other duties and assignments as required.
- Qualifications
- Security Clearance:
- Requires an active Secret Clearance
- Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required.
- Bachelor’s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
- This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
- The authorized certifications for this job title are listed as follows:
- BASELINE:
- Cisco: CCNP: Certified Network Professional - Security
- CompTIA: CASP+ ce: Advanced Security Practitioner
- GIAC: GCED: Certified Enterprise Defender
- GIAC: GCIH: Certified Incident Handler
- ISACA: CISA: Certified Information Systems Auditor
- ISC2: CCSP: Certified Cloud Security Professional
- ISC2: CISSP (or Associate): Certified Information Systems Security Professional
- ISC2: CCSP: Certified Cloud Security Professional
- COMPUTING ENVIRONMENT (CE):
- Cisco: CCIE: Certified Internetwork Expert (Any)
- Cisco: CCNP: Certified Network Professional (Any)
- EC Council: CEH: Certified Ethical Hacker
- EC Council: ECIH: Certified Incident Handler
- EC-Council: CHFI: Certified Hacking Forensic Investigator
- EC-Council: CND: Certified Network Defender
- GIAC: GCIH: Certified Incident Handler
- Microsoft: 365 Certified: Enterprise Administrator Expert
- Microsoft: Certified: Azure Associate (Any)
- Microsoft: Certified: Azure Expert (Any)
- Microsoft: MCSE: (Any above 2012)
- Red Hat: RHCA: Certified Architect
- Red Hat: RHCE: Certified Engineer
- Red Hat: RHSA: Certified Systems Administrator
- Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience.
- Requires a minimum of seven (7) years of experience in telecommunications sector.
- Experience with a customer service-oriented company.