Determine overall Common Vulnerabilities and Exposures (CVE) priority when threat activity is identified; report incidents that may cause immediate and/or ongoing impact to the environment.
Monitor and provide periodic system owners vulnerability mitigation completion updates.(U) Knowledge of system and application security threats, vulnerabilities, and cyber attackers.
Monitor external data sources to determine which security issues may have an impact on the enterprise.
Identify, develop, and determine mitigation or remediation actions for system and network vulnerabilities.
Communicate written and verbal information in a timely, clear, and concise manner.
VuApply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
Knowledge of system administration, network, operating system hardening techniques, and the risk management process.
Knowledge of specific operational impacts of cybersecurity lapses and organization's threat environment.
Recommend impact/risk assessments to identify systemic security issues based on the analysis of vulnerability and configuration data.
Document and escalate incidents (including event’s history, status, and potential impact for further action); recommend mitigations that will have immediate impact to the environment.(U) Perform after-action reviews of team products to ensure completion of analysis.
Lead and mentor team members as a technical expert.
Minimum Required Qualifications
Due to the nature of this position and the information that employees will be required to access; U.S. Citizenship is required.
Active Top Secret Security Clearance with Full Scope polygraph is required.
Four (4) years of demonstrated experience as a VM in programs and contracts of similar scope, type, and complexity is required.
Two (2) years of experience of technical reporting.
Two (2) years of experience in network and threat analysis
A technical bachelor’s degree from an accredited college or university may be substituted for two (2) years of VM experience on projects of similar scope, type, and complexity.