Please scroll down, To apply

Information Assurance II (Vulnerability Assessment / ACAS Sec Ma with Security Clearance

hiring now
New job

People, Technology and Processes LLC

2024-11-05 08:42:32

Job location Montgomery, Alabama, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

Description Position Title: Information Assurance II (Vulnerability Assessment / ACAS Sec Manager) Location: Maxwell Gunter Airforce Base, AL Clearance level: TS/ SCI Eligible Responsibilities (including but not limited to): Perform assessments of system and network and identifies where the system/network deviate from acceptable configurations, DoD policy, or local policy/guidelines. Measure effectiveness of defense in depth architecture against known vulnerabilities using available tools within organization to find them. Analyze, prioritize, and mitigate vulnerabilities to lower or eliminate risk. Create reports to effectively communicate problems and proposed solutions. Actively manage (inventory, track, and request corrective action) all hardware devices on network that only authorized devices are given access and unauthorized and unmanaged devices are found and prevented from gaining access. Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution. Submit tickets to appropriate teams for corrective actions. Conduct/review/validate vulnerability scans. Perform vulnerability scans to include analysis of results, identification of false positives, exceptions, and subsequent POA&Ms and/or MFRs creation, monitoring and reporting to include POA&M status and contributions to Monthly and Quarterly reports. Scan and support operations to include supporting the test/scanning environment, licensing, target asset refreshes, and credentials. Collect and review data gathered from a variety of tools (including intrusion detection system alerts, firewall, network traffic logs, and host system logs) to analyze events for possible attacks that occur within the environment. The environments can be computing, network, or enclave. Validate, investigate, and analyze all response activities related to cyber incidents. These tasks include but are not limited to creating and maintaining incident tracking information; planning, coordinating, and directing recovery activities; and incident tracking information; and incidents analysis tasks, including examining all available information and supporting evidence of artifacts related to an incident or event. Perform assessments of systems and networks within the network environment or enclave and identify where those systems and/or networks deviate from acceptable configurations, enclave policy, or local policy. Qualifications High School diploma or GED 3+ years of experience in utilizing security relevant tools to include NESSUS, ACAS, DISA STIGs, Audit Tools, Forescout, ESS. Must possess a Top Secret Clearance with SCI eligibility.

Inform a friend!

<!– job description page –>
Top