Please scroll down, To apply

Vulnerability Assessment Analyst-intermediate (nga) with Security Clearance

hiring now

Quantum Research International, Inc.

2024-11-07 04:37:56

Job location Chantilly, Virginia, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

Job Description Quantum Research International, Inc. (Quantum ) is a certified DoD Contractor providing services and products to US/Alliedgovernments and industry in the following main areas: (1) Cybersecurity, High Performance Computing Systems, Cloud Services and Systems; (2) Space and Ground Support Systems; (3) Aviation Systems; (4) Missile Systems; (5) Artificial Intelligence/ Machine Learning Systems and Experimentation/Training; and (6) Audio Visual Systems and Services. Quantum's Corporate Office is in Huntsville, AL, but Quantum actively hires for positions nationwide and internationally. We pride ourselves on providing high quality support to the U.S. Government and our Nation's Warfighters. In addition to our corporate office, we have physical locations in Aberdeen; MD; Colorado Springs, CO; Orlando, FL; Crestview, FL; and Tupelo, MS. Mission: As a member of the NGA DEFENDER Cybersecurity Risk Management team, the Vulnerability Assessment Analyst (VAA) executes the risk management framework (RMF) in accordance with NIST SP 800-37 R2 (or subsequent versions) and NGA's RMF Implementation Guide (RIG) for all NGA-authorized systems. This position is available immediately and supports the National Geospatial-Intelligence Agency (NGA) at an offsite location in Chantilly, VA. Responsibilities: Performing assessments of systems and networks within the network environment or enclave and identifying where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Developing measures of effectiveness for defense-in-depth architectures against known vulnerabilities.
Identifying systemic security issues based on the analysis of vulnerability and configuration data.
Applying programming language structures (e.g., source code review) and logic.
Sharing meaningful insights about the context of an organization's threat environment that improve its risk management posture. Applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Requirements: Bachelor's degree (technically relevant degree preferred). In lieu of degree, Sec+, GICSP, Cloud+, GCED, PenTest+, or GSEC may be accepted.
Knowledge of Government standards for data security such as markings, handling of classified and unclassified information, and how to handle the distribution of this information
Knowledge of computer networking concepts and protocols, and network security methodologies, risk management processes (e.g., methods for assessing and mitigating risk), and laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Knowledge of cyber threats and vulnerabilities, and operational impacts of cybersecurity lapses. Knowledge of cryptography and cryptographic key management concepts and host/network access control mechanisms (e.g., access control list, capabilities list). Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol TCP and Internet Protocol IP , Open System Interconnection Model OSI , Information Technology Infrastructure Library, current version ITIL ).
Knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities. Conduct vulnerability scans and recognize vulnerabilities in security systems.
Review logs to identify evidence of past intrusions and conduct application vulnerability assessments.
TS/SCI eligible, subject to CI Polygraph
IAM or IAT Level 2 Desired/Preferred Skills Assessing the robustness of security systems and designs.
Detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort).
Mimicking threat behaviors and the use of penetration testing tools and techniques.
Using network analysis tools to identify vulnerabilities. (e.g., fuzzing, Nmap, etc.). ONSITE Equal Opportunity Employer/Affirmative Action Employer M/F/D/V: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, veteran status, genetic information, sexual orientation, gender identity, or any other characteristic protected by law. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Inform a friend!

<!– job description page –>
Top