DE Jobs

Search from over 2 Million Available Jobs, No Extra Steps, No Extra Forms, Just DirectEmployers

Job Information

NANA Regional Corporation Vulnerability Management Analyst (Active Top Secret with SCI Eligibility REQUIRED) in Alexandria, Virginia

Overview

Work Where it Matters

Akima Data Management (ADM), an Akima company, is not just another federal IT contractor. As an Alaska Native Corporation (ANC), our mission and purpose extend beyond our exciting federal projects as we support our shareholder communities in Alaska.

At ADM, the work you do every day makes a difference in the lives of our 15,000 Iñupiat shareholders, a group of Alaska natives from one of the most remote and harshest environments in the United States.

For our shareholders , ADM provides support and employment opportunities and contributes to the survival of a culture that has thrived above the Arctic Circle for more than 10,000 years.

For our government customers , ADM delivers agile and innovative cloud and IT services and solutions that enable mission dominance.

As an ADM employee , you will be surrounded by a challenging, yet supportive work environment that is committed to innovation and diversity, two of our most important values. You will also have access to our comprehensive benefits and competitive pay in addition to growth opportunities and excellent retirement options.

Job Summary:

ADM is looking for a Vulnerability Management Analyst to work in Alexandria, VA. To join our team of outstanding professionals, apply today!

Responsibilities

Job Responsibilities:

  • Support DoD OIG with conducting regular and ad-hoc testing of applications, information systems and networks to identify weaknesses of individual IT assets and evaluate the cybersecurity posture of DoD OIG’s networks, facilities, and enterprise capabilities.

  • Perform security vulnerability management and assistance with remediation activities.

  • Perform ongoing configuration verification and vulnerability assessment scanning for compliance with OIG’s standard. Upon request, perform discovery scanning to identify unidentified hosts in OIG's IT Environment.

  • Maintain and update the Assured Compliance Assessment Solution (ACAS), including the operating system.

  • Develop, implement, and oversee Cybersecurity Program initiatives, which include defining Cybersecurity policies, processes, and standards.

  • Ensure the rigorous application of information security and cybersecurity policies, principles, andpractices to the system analysis process.

  • Provide security and network engineering expertise in areas of networking technologies, security monitoring solutions, and system performance engineering. The contractor shall provide fully qualified and skilled individuals with experience in networking technologies, security monitoring solutions, and system performance engineering.

  • Perform security vulnerability assessment, management, and remediation activities. Monitor and respond to guidance, directives, and issuances from the USCYBERCOM, and tracks and reports on compliance with Communication Tasking Orders (CTOs), Task Order (TASKORD), Operational Orders (OPORD), Information Assurance Vulnerability Alerts (IAVAs) and other security requirements using the Continuous Monitoring and Risk Scoring (CMRS) System.

  • Validating authentication and authorization to access managed resources

  • Create, track, and submit Plan of Action and Milestones (POA&M) for security weaknesses identified in coordination with Subject Matter Experts (SMEs).

  • Create and maintain IA accreditation documentation to include RMF and Approval to Connect (ATC) packages.

  • Support the oversight of PKI, key management, and data at rest encryption systems.

  • Respond, categorize, log, and report security incidents according to OIG SOPs & processes.

  • Monitor, review, analyze, and respond to cybersecurity issues in information technology service management system.

Qualifications

Minimum Qualifications:

  • Active Top-Secret clearance with SCI eligibility.

  • Meet qualification requirements in accordance with DoDD 8140.01 and DoDM 8140.03 DoD Cyberspace Workforce Qualification and Management Program.

  • Industry standard cybersecurity certification, such as: Sec+, CISSP, CySA, GSEC, CEH, CISM, or others.

  • Subject Matter Expertise with utilizing Assured Compliance Assessment Solution (ACAS).

  • Must have current ACAS training.

  • Experience with Cybersecurity policy development, application, and enforcement.

  • Excellent communication, problem-solving, teamwork, and collaboration skills.

We are an equal opportunity employer and comply with all applicable federal, state, and local fair employment practices laws. All applicants will receive consideration for employment, without regard to race, color, religion, creed, national origin, gender or gender-identity, age, marital status, sexual orientation, veteran status, disability, pregnancy or parental status, or any other basis prohibited by law. If you are an individual with a disability, or have known limitations related to pregnancy, childbirth, or related medical conditions, and would like to request a reasonable accommodation for any part of the employment process, please contact us at job-assist@akima.com or 571-353-7053 (information about job applications status is not available at this contact information).

Job: Information Technology

Travel: None

Organization: ADM - Akima Data Management

Clearance: TS/SCI

Work Type: On-Site

Remote: No

ReqID: 2024-11907

DirectEmployers