Please scroll down, To apply

Information Assurance III (Vulnerability Assessment / ACAS Sec M with Security Clearance

hiring now
New job

People, Technology and Processes LLC

2024-11-05 08:42:29

Job location Montgomery, Alabama, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

Description Position Title: Information Assurance III (Vulnerability Assessment / ACAS Sec Manager) Location: Maxwell/Gunter Airforce Base, AL Clearance level: TS/ SCI Eligible Responsibilities (including but not limited to): Perform assessments of system and network and identifies where the system/network deviate from acceptable configurations, DoD policy, or local policy/guidelines. Measure effectiveness of defense in depth architecture against known vulnerabilities using available tools within organization to find them. Analyze, prioritize, and mitigate vulnerabilities to lower or eliminate risk. Create reports to effectively communicate problems and proposed solutions. Actively manage (inventory, track, and request corrective action) all hardware devices on network that only authorized devices are given access and unauthorized and unmanaged devices are found and prevented from gaining access. Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution. Submit tickets to appropriate teams for corrective actions. Conduct/review/validate vulnerability scans. Perform vulnerability scans to include analysis of results, identification of false positives, exceptions, and subsequent POA&Ms and/or MFRs creation, monitoring and reporting to include POA&M status and contributions to Monthly and Quarterly reports. Scan and operation support includes supporting the test/scanning environment, licensing, target asset refreshes, and credentials. Collect and review data gathered from a variety of tools (including intrusion detection system alerts, firewall, network traffic logs, and host system logs) to analyze events for possible attacks that occur within the environment. The environments can be computing, network, or enclave. Validates, investigates, and analyzes all response activities related to cyber incidents. These tasks include but are not limited to: creating and maintaining incident tracking information; planning, coordinating, and directing recovery activities; and incident tracking information; and incidents analysis tasks, including examining all available information and supporting evidence of artifacts related to an incident or event. Perform assessments of systems and networks within the network environment or enclave and identify where those systems and/or networks deviate from acceptable configurations, enclave policy, or local policy. Qualifications High School diploma or GED. 5+ years of experience in utilizing security relevant tools to include: NESSUS, ACAS, DISA STIGs, Audit Tools, Forescout, ESS. Must possess a Top Secret Clearance with SCI eligibility. Certification Authorization Professional (CAP) AND DISA ACAS Supervisor and Operator Course AND DISA Enterprise Mission Assurance Support Service (eMASS) AND (CISSP OR CISM). 3+ years of experience in utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include: NESSUS, ACAS, DISA STIGs, Audit Tools, ESS, eMASS, PPS. Desired Qualifications: CISSP

Inform a friend!

<!– job description page –>
Top