Vulnerability Analyst

Clearance Level
Top Secret/SCI
Category
Cyber and IT Risk Management
Location
Tampa, Florida
(Onsite Workplace)
Key Skills For Success

ACAS

Risk Assessments

Threat and Vulnerability Management

Vulnerability Scanning

REQ#: RQ215583
Public Trust: None
Requisition Type: Regular
Your Impact

Own your opportunity to support our nation's defense. Make an impact by connecting and securing critical operations across the globe, keeping our country safe and secure.

Job Description

Check out this great opportunity to join one of GDIT’s fastest long-standing growing programs!  US Battlefield Information Collection and Exploitation Systems eXtended (US BICES-X) is a cutting-edge program supporting DoW intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war fighter and their missions. We are seeking a creative and driven professional with a passion for solving real world issues on a cross-functional, fast paced team. 

The Vulnerability Analyst is a strong, self-motivated, solution-oriented individual who will be joining an experienced team to support the implementation and sustainment of ACAS across multiple networks. We are looking for an experienced, innovative, and enthusiastic analyst to join us in delivering high quality IT systems.

Responsibilities:

  • Conduct and Manage ACAS Vulnerability Scanning, including Tenable.sc, Nessus Agent and Nessus Network Monitor.
  • Analyze policies, configurations, and evaluate compliance with regulations and directives.
    Maintain knowledge of applicable policies, regulations, and compliance documents specifically related to ACAS.
  • Perform vulnerability assessments and security reviews to identify weaknesses and vulnerabilities within systems that affect the confidentiality, integrity and availability of data.
  • Analyze vulnerability reports and suggest remediation / mitigation plans.
  • Coordinate with cybersecurity administrators to improve security tools for monitoring and increasing coverage of existing tools.
  • Collect, aggregate, synthesize, analyze and report on data from multiple sources and formats.
  • Provide technical support to system owners to propose mitigation and remediation solutions to identified vulnerability and security issues.
  • Leverage enterprise methodologies and patterns.
  • Develop high level system design diagrams and system documentation.
  • Evaluate, analytically and systematically, problems with workflows, organization and planning and develop appropriate corrective actions.
  • Excellent written and verbal communication skills, with a strong attention to detail and superior ability for problem solving.

Required Qualifications:

  • 10+ years of experience.
  • Must meet DOW 8140 requirements and be eligible for IAT level II.
  • Must possess and maintain a Top Secret/SCI Security Clearance.
  • BA/BS or the equivalent combination of education, technical training, or work/military experience.
  • A minimum of five (5) years' experience in building, maintaining, and supporting ACAS related technologies: Tenable.sc, Nessus Agent, and Nessus Network Monitor.
  • Experience with data analytics, preferably using Excel, Access, SQL, Tableau, Power BI and Tenable.sc API.
  • Must have completed ACAS Operator and Supervisor course within the last three years.
  • Ability to work in a team-oriented, collaborative environment.
  • Ability to work efficiently in a fast-paced environment and multi-task while still ensuring high quality of work
  • Highly organized with strong ability to prioritize work and work autonomously
  • Excellent verbal and written communication skills
  • Great attention to detail and presentation
  • Results driven, highly efficient, energetic, and highly motivated

Preferred Qualifications:

  • Knowledge of how traffic flows across the network (TCP/IP, OSI, ITIL).
  • Knowledge of authentication methods and supporting protocols.
  • Skilled in conducting vulnerability scans and recognizing vulnerabilities in systems.
  • Developing and presenting briefings to senior leadership.
Work Requirements
Years of Experience

10 + years of related experience

* may vary based on technical training, certification(s), or degree

Certification

Travel Required

None

Citizenship

U.S. Citizenship Required

Salary and Benefit Information

The likely salary range for this position is $97,968 - $119,600. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
View information about benefits and our total rewards program.

About Our Work

We are GDIT. A global technology and professional services company that delivers technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across over 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, cloud, cyber and application development. Together with our customers, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc.

Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans