Vulnerability Analyst I V2X

Employer Active

Posted on 18 Sep

Experience

7 - 9 Years

Job Location

Kuwait - Kuwait

Education

Bachelor of Science(Computers)

Nationality

Any Nationality

Gender

Not Mentioned

Vacancy

1 Vacancy

Job Description

Roles & Responsibilities

Conduct regular security assessments and audits of information systems with the DoD SWA network.

Develop and implement action plans to manage common vulnerabilities and exposures.

Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating.

Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN.

Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities.

Recommend improvements to the overall cybersecurity posture.

Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently.

Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON.

Prepares vulnerability scanning reports to submit to commanders and higher headquarters.

Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues.

Additional requirements may vary depending upon location.

Performs other duties and assignments as required.

Desired Candidate Profile

Requires an active Secret Clearance

Bachelor s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.

This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: BASELINE: Cisco: CCNP: Certified Network Professional - Security CompTIA: CASP+ ce: Advanced Security Practitioner GIAC: GCED: Certified Enterprise Defender GIAC: GCIH: Certified Incident Handler ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Certified Cloud Security Professional ISC2: CISSP (or Associate): Certified Information Systems Security Professional ISC2: CCSP: Certified Cloud Security Professional COMPUTING ENVIRONMENT (CE): Cisco: CCIE: Certified Internetwork Expert (Any) Cisco: CCNP: Certified Network Professional (Any) EC Council: CEH: Certified Ethical Hacker EC Council: ECIH: Certified Incident Handler EC-Council: CHFI: Certified Hacking Forensic Investigator EC-Council: CND: Certified Network Defender GIAC: GCIH: Certified Incident Handler Microsoft: 365 Certified: Enterprise Administrator Expert Microsoft: Certified: Azure Associate (Any) Microsoft: Certified: Azure Expert (Any) Microsoft: MCSE: (Any above 2012) Red Hat: RHCA: Certified Architect Red Hat: RHCE: Certified Engineer Red Hat: RHSA: Certified Systems Administrator

One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience.

Requires a minimum of seven (7) years of experience in telecommunications sector.

Experience with a customer service-oriented company.

Company Industry

Department / Functional Area

Keywords

  • Vulnerability Analyst I

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@naukrigulf.com

V2X

Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.

Read More

https://careers.gov2x.com/why-gov2x/jobs/48913?lang=en-us