drjobs Theatre Vulnerability Analyst

Theatre Vulnerability Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Honolulu, HI - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Agil3 Technology Solutions LLC (A3T) a small Women-Owned Service-Disabled Veteran-Owned and 8(a) Small Disadvantaged Business delivers expert-level information systems and cybersecurity solutions to federal state and private sector clients. We are seeking a highly skilled Theatre Vulnerability Analyst to provide expert support analysis and research into exceptionally complex problems and processes relating to Theater Vulnerability Management.

Job Duties
  • Analyzes AOR cyber security posture reports.
  • Provides cyber units expertise and fix action with base cyber units and provides leadership a depiction of Wings ability to:
    • Scan Assured Compliance Assessment Solution (ACAS)
    • Mitigate (via MS System Center Configuration Management (SCCM)/MS Endpoint Configuration Manager (MECM)) and
    • Maintain Host Based point products mandated by the DoD (End Point Security formerly known as HBSS).
  • Maintains proficiency on current and future End Point Security assessment tools.
  • Assists cyber field support team with Vulnerability Management (VM).
  • Provide and/or coordinate vulnerability mentor training (virtual or on-site) to bases as requested.
  • Creates and maintains cyber security/VM management training documentation.
  • Interfaces with cybersecurity technicians/ISSMs to maintain up-to-date reporting to keep operations compliant.
  • Coordinate with Vulnerability Management teams upon scan result analysis.
    • Identify patching issues/troubleshooting way ahead.
    • Produce report to chain of command informing of patching status.
  • Maintains command wide SCCM and MECM health status.
  • Analyze and produce command wide NIPRNet & SIPRNet weighted vulnerability indicator scores.
  • Produce and disseminate cybersecurity/vulnerability reports to staff containing current security posture.
  • Utilizes CORA reports from the DISA J3 website on SIPRNet to advise Cybersecurity staff of findings and level of risk.
  • Assists with cyber operations briefs by preparing and briefing command-wide statuses to the Director of Air and Cyberspace Operations.
  • Creates and conducts compliance update briefs on command wide cyber security status and assist with troubleshooting cyber security short falls.
  • Assists with creating TASKORDs to raise cyber security posture.
  • Tracks status of VM POAMs until completion and reports at risk POAMs to leadership.
  • Augments CRR-M team as required.
  • Maintain Internet Protocol (IP) space and asset lists to cover 100% base assets.
  • Maintain MAJCOM ACAS Account with auditing role in order to analyze and produce vulnerability metrics
  • Maintain SIPRNet PROD Account in order to provide command wide SCCM/MECM patching analysis on SIPRNet
  • Maintain ELICSAR Account for situational awareness of cybersecurity toolsets used
  • Maintain AFNET Compliance Tracker Account in order to maintain situational awareness of CTOs MTOs TCNOs pertaining to vulnerability management.
  • Provides Government Representative
      • Contract Personnel Roster
      • Updates to contractor availability
      • Contract Invoices & Funding Expenses
      • Monthly Status Report (MSR)
      • Contractors Non-Disclosure Agreements (NDA)
      • Kick-Off Brief & Close-Out Brief
      • Transition Brief
      • Assistance with processing contractors travel requirements
  • Track contract
      • Labor/Events/Workload/Travel schedule & expenses
      • Metrics of Program for Yearly Closeout
  • Provides Cybersecurity SME contractors assistance with:
      • Common access Card (CAC) ID processing and renewals
      • Building Badge processing and renewals
      • DD254
      • TS/SCI processing and renewals
      • Synchronized Pre-deployment and Operational Tracker (SPOT) processing.
      • Financial preparation
      • Letters of Identification
      • Travel Estimates/Schedule
  • Ensure all contractors follow all applicable commercial and government/military standards which include but are not limited to the following:
      • Department of Defense Instruction 8500.01 Cybersecurity
      • Department of Defense Instruction 8510.01 RMF for DoD Systems
      • Committee on National Security Systems Instruction 1253 Security Categorization and Control Selection for National Security Systems
      • National Institute of Standards and Technology Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Organizations
      • National Institute of Standards and Technology Special Publication 800-53A Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans
      • National Institute of Standards and Technology Special Publication 800-39 Managing Information Security Risk: Organization Mission and Information System View
      • National Institute of Standards and Technology Special Publication 800-30 Guide for Conducting Risk Assessments
      • All applicable DISA STIGs and Security Review Guides (SRGs)
      • Air Force Instruction (AFI) 17-130 Cyber Security Program Management
      • AFI 17-101 RMF for Air Force Information Technology (IT)
      • AFI 17-110 Information Technology Portfolio Management and Capital Planning and Investment Control
General Job Requirements
  • TS/SCI security clearance
  • DoD 8570.1-M certified at IAT Level 3 - Anyone (1) of the following:
    • CASP CE
    • CCNP Security
    • CISA
    • CISSP (or Associate)
    • GCED
    • GCIH
    • CCSP
  • 2-3 years of experience and the skills required to execute Federal National DoD USAF CIO and US State Department Requirements to be able to assess cyber risk identify mission sets and defend the mission.
  • 2-3 years of experience of applying assessing and advising MAJCOM staff and Wings on cybersecurity requirements.
  • Understand the AF Cyber architecture and MOBs and GSUs roles.
  • Ability to travel to MOBs and GSUs to conduct duties and responsibilities - at a minimum of 40% of the time.
  • Certificates of completion for the following training:
    • Level 1 Anti-Terrorist Training - within the past year
    • Level A Survival Evasion Resistance and Escape (SERE) Training - within the past 1-2 years
    • USFK Training - no time requirement (only required to be taken once)
    • DoD Cyber Awareness Challenge - within the past year
    • Operations Security (OPSEC) Awareness - within the past year
    • Derivative Classification IF103.16 - within the past year
    • Force Protection - within the past year
    • COR will provide update website addresses to the above that may change.
  • 3-4 years of experience conducting Network Vulnerability Engineering functions.
  • Expertise in the following DoD AF DISA NIST NIAP and processes:
    • 3-4 years of experience of DoD approved Scanning Tools (e.g. ACAS)
    • 3-4 years of experience of Microsoft SCCM & MECM
    • Familiarization of End Point Security Point Product requirements
    • Ability to analyze and develop cyber vulnerability information into an understandable presentation.
    • Proficiency in Microsoft Office Suite products and SharePoint collaborative tools to build trend analysis.
    • In-depth experience with DISA STIGs and by-product analysis.
Threat Vulnerability Analyst Skills Knowledge and Abilities:
  • Ability to maintain view rights to SIPRNet and NIPRNet vulnerability tools to analyze and compile data for leadership
  • Knowledge and understanding of the latest vulnerability management (scanning patching reporting metrics) processes and procedures and be able to maintain currency.
  • Knowledge and understanding of USAF Methods and Procedures Technical Order(MPTO)A USCYBERCOM Computer Network Defense (CND)
  • Directives Task Orders (TASKORDs) Operational Orders (OPORDs) and track Time Compliance Network Orders (TCNO) and Information Assurance Vulnerability Management (IAVM) programs.
    • Understanding of Host Base Security System (HBSS)/ePolicy Orchestrator (ePO) functions:
    • How to produce asset lists to identify devices capable of McAfee Agent install.
    • How to produce asset lists to identify devices not capable of McAfee Agent install (whitelists).
  • Experience conducting discovery scans to identify unknown base assets.
  • Experience analyzing vulnerability scan results and providing way forward to improve cybersecurity posture with patching.
  • Experience maintaining credentials to scan for 95% accuracy on base assets to include Program Management Office (PMO) systems.
  • Experience conducting vulnerability scanning via ACAS/ on 100% of assets during assigned scan schedule.
  • Ability to receive organize and present vulnerability notifications & statuses.
  • Experience with email and other communication platforms to include but not limited to MS Teams group chats MS SharePoint site and VoIP Phones.
  • Proficiency with the latest Microsoft tool suite (i.e. PowerPoint Excel Word etc.).
  • Ability to collaborate with others.
  • Ability to brief technical information to both technical and non-technical audiences.
  • Experience briefing senior leaders and large audiences.
  • Excellent Communication skills (Written and Verbal)
  • Ability to Lead
  • Organizational awareness
  • In-depth problem-solving experience
  • Proficiency time management
  • Ability to critically think
Company Overview

Agil3 Technology Solutions LLC (A3T) is a Northern Virginia based ISO 9001:2018 ISO 20000 & ISO 27001 Certified 8a Women-Owned (WOSB) and Service-disabled Veteran-Owned (SDVOSB) small business. A recent recipient of the prestigious Washington Technology TOP 50 (ranking #9 and on the list for last 4 years!) A3T is experiencing industry leading recognition and growth. In addition to the CEOs recognition as an All-Star Entrepreneur A3T is recognized by Inc Magazine as one of the fastest growing companies in the country by Vet 50 as Fastest Growing Veteran-Owned Businesses and is featured in CyberSecurity Ventures / Cybercrime Magazine! As a go-to Women-Owned Cybersecurity company in US and internationally. As part of our growth we are looking for YOU to join our growing team.

A3T offers excellent benefits to enhance the work-life balance including:

  • Medical Insurance
  • Dental Insurance
  • Vision Insurance
  • Life Insurance
  • Short Term & Long-Term Disability
  • 401k Retirement Savings Plan with Company Match
  • Paid Holidays
  • Paid Time Off (PTO)
  • Tuition and Professional Development Assistance
  • Parking/Travel Reimbursement (metropolitan areas)

Required Experience:

Senior IC

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.