logo

View all jobs

Vulnerability Manager II

San Antonio, TX

Essential Job Functions

  • Knowledge of cyber threats and vulnerabilities. 
  •  Determine overall Common Vulnerabilities and Exposures (CVE) priority when threat activity is identified; report incidents that may cause immediate and/or ongoing impact to the environment. 
  •  Monitor and provide periodic system owners vulnerability mitigation completion updates.(U) Knowledge of system and application security threats, vulnerabilities, and cyber attackers. 
  • Monitor external data sources to determine which security issues may have an impact on the enterprise. 
  •  Identify, develop, and determine mitigation or remediation actions for system and network vulnerabilities. 
  •  Communicate written and verbal information in a timely, clear, and concise manner. 
  • VuApply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). 
  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). 
  •  Knowledge of system administration, network, operating system hardening techniques, and the risk management process. 
  • Knowledge of specific operational impacts of cybersecurity lapses and organization's threat environment. 
  • Recommend impact/risk assessments to identify systemic security issues based on the analysis of vulnerability and configuration data. 
  •  Document and escalate incidents (including event’s history, status, and potential impact for further action); recommend mitigations that will have immediate impact to the environment.(U) Perform after-action reviews of team products to ensure completion of analysis. 
  • Lead and mentor team members as a technical expert. 

Minimum Required Qualifications

  •  Due to the nature of this position and the information that employees will be required to access; U.S. Citizenship is required.
  • Active Top Secret Security Clearance with Full Scope polygraph is required.  
  • Four (4) years of demonstrated experience as a VM in programs and contracts of similar scope, type, and complexity is required.  
  • Two (2) years of experience of technical reporting. 
  • Two (2) years of experience in network and threat analysis 
  • A technical bachelor’s degree from an accredited college or university may be substituted for two (2) years of VM experience on projects of similar scope, type, and complexity. 
  • Multiple Shifts available.

Share This Job

Powered by