drjobs Workstation Vulnerability and Patch Management Specialist

Workstation Vulnerability and Patch Management Specialist

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Alexandria - USA

Monthly Salary drjobs

$ 51000 - 82000

Vacancy

1 Vacancy

Job Description

Responsibilities

Workstation Vulnerability & Patch Management Specialist

Peraton is seeking a skilled Workstation Vulnerability and Patch Management Specialist to lead enterprise-wide vulnerability remediation and patch compliance initiatives. This role ensures system integrity supports RMF compliance and mitigates cybersecurity risk in alignment with DoD and NIST standards.

Key Responsibilities:

  • Identify and remediate vulnerabilities across Windows and Linux endpoints using Tanium ACAS and Microsoft Configuration Manager (MCM).

  • Configure and manage software update points deployment packages and automated patch rollouts via MCM.

  • Monitor compliance and deployment success through MCMs reporting tools.

  • Implement phased deployment strategies to ensure stability and minimize service disruption.

  • Package and deploy software applications and updates across enterprise environments.

  • Maintain an application catalog for user-initiated installations as applicable.

  • Manage software dependencies and prerequisites to ensure successful deployments.

  • Provide regular reports on patch compliance system health and remediation progress.

  • Utilize MECM Tanium and related tools for scalable patch management and compliance reporting.

#USCGIMS

Qualifications

Basic Qualifications:

  • U.S. Citizen with active DoD Secret clearance or higher

  • Associates degree in IT Cybersecurity or related field plus 2 years of relevant experience; OR Bachelors degree with no experience; OR High School Diploma with 4 years of experience

  • Proven experience in vulnerability and patch management

  • Proficient with patch deployment tools (e.g. MECM Tanium)

  • Knowledgeable in DISA STIGs IAVMs NIST SP 800-53 and RMF frameworks

  • Skilled in analyzing ACAS/Tenable reports and tracking remediation efforts

Preferred Qualifications:

  • CompTIA Security CASP CISSP or equivalent DoD 8570 IAT Level II/III certifications

  • Experience supporting DoD or federal civilian cybersecurity initiatives

  • Familiarity with ServiceNow or Remedy ticketing systems

Work Environment:

  • Ability to work on-site or in classified settings as needed

  • Availability for occasional after-hours support during emergency patching or system recovery

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider we deliver trusted highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land sea space air and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day our employees do the cant be done by solving the most daunting challenges facing our customers. Visit to learn how were keeping people around the world safe and secure.

Target Salary Range

EEO


Required Experience:

Unclear Seniority

Employment Type

Full-Time

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.