Vulnerability Management Analyst

Washington, D.C
Federal / Civilian – Cyber / Security /
Regular /
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.

Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.

Requisition #: 396
Job Title: Vulnerability Management Analyst
Location: 1155 21st St NW Washington, District of Columbia 20581
Clearance Level: Active DoD - Public Trust
Required Certification(s): 
·       Current industry certification such as CASP, CAP, CISSP, CISM, GSEC, GMON, or Security+

Candidate must successfully receive a Public Trust clearance. Onsite support is required in Washington, DC. 1x per week (Wednesdays. Additional days onsite may be required at customer direction)

The Vulnerability Management Analyst will join a team of cross-functional cybersecurity experts in support of a government agency's Governance, Risk and Compliance Program. As a member of this team, the Vulnerability Management Analyst will support ongoing vulnerability management activities and future initiatives to achieve the agency's strategic goals and objectives.
The ideal Vulnerability Management Analyst candidate is an independent, strong problem solver who thrives in fast-paced and evolving security environments. The candidate has a passion for mitigating security risk and isn't deterred by the rapidly evolving nature of the threat landscape. The Vulnerability Management Analyst will join a team of cross-functional cybersecurity experts in the performance of activities, including assessments & authorization (A&A) and ongoing authorization (OA), security engineering, identity and access management (IAM), cloud security architecture, vulnerability management, cybersecurity training, and policy development for a government agency.  The Vulnerability Management Analyst must have SME knowledge of scanning applications, to include Qualys, a deep understanding of vulnerability management, and the ability to implement effective strategies and approaches to communicate, coordinate, and mitigate vulnerability-related security risks.

·       Leverage enterprise scanning applications or tools approved by the government in support of the Vulnerability Management Program.
·       Provide routine and ad-hoc automated vulnerability scans, scans in support of audits, scan result analysis, and validation scans of remediated vulnerabilities identified during vulnerability assessments.
·       Support vulnerability scans of information systems for on-premise and hybrid cloud systems, as necessary.
·       Support scanning and testing at the application and database level and refine and mature scanning metrics and thresholds to improve program maturity.
·       Normalize data and provide results to system owners, system administrators, and Information Systems Security Officers (ISSOs) in support of change requests, ongoing authorizations, or systems undergoing authorizations to operate.
·       Analyze weekly DHS Cyber Hygiene reports, facilitate remediation of findings therein, and promote comprehensive scanning coverage of all Internet-reachable IT assets.
·       Identify corrective actions, compensating controls, and assist with POA&M development in the government agency's GRC tool.
·       Identify mitigations for non-compliance, notify stakeholders of compliance issues and, where required, perform these mitigations.
·       Take into account any infrastructure challenges and make recommendations for improvements where needed. This includes third party service provider hosted Software as a Service (SaaS), Platform as a Service (PaaS) instances as well as Infrastructure as a Service (IaaS)
·       Provide expertise in the review of new vulnerability technologies and capabilities and interact with other technology divisions to facilitate deployment.
·       This is non-supervisory position.

Required Certifications
·       Current industry certification such as CASP, CAP, CISSP, CISM, GSEC, GMON, or Security+.
Education, Background, and Years of Experience
·       Bachelor’s Degree in Computer Science, Computer Engineering, Information Systems.
·       7 years of experience in Information Assurance (IA) or cybersecurity with at least 3 years of experience in vulnerability management.

Required Skills
·       Experience with vulnerability scanning applications, to include Qualys and DBProtect.
·       Experience analyzing results, normalizing data, and communicating with broad IT/non-IT stakeholder groups.
·       Experience with STIG compliance baselines.
·       Experience with NIST 800-53 security controls and compliance frameworks, such as NIST CSF and NIST RMF.
·       Excellent communication skills, including verbal and written.
·       Strong presentation skills required.
Preferred Skills
·       Experience with BurpSuite preferred.
·       Experience facilitating and/or participating in risk acceptance reviews and approvals desired.

Environmental Conditions
·       Contractor site with 0% travel possible. Possible occasional off-hours work to support non-business hours scanning for critical systems. Customer site is a general office environment. Work is generally sedentary in nature but may require standing and walking for up to 10% of the time. The working environment is generally favorable. Lighting and temperature are adequate, and there are not hazardous or unpleasant conditions caused by noise, dust, etc. Work performed at customer site is within an office environment, with standard office equipment available.
Strength Demands
·       Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles.  Some occasional walking or standing may be required.   Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.
Physical Requirements
·       Stand or Sit; Repetitive Motion; See
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.

Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.

Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.

Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.

Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.

Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.

Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)