$90K - 130K a year
Manage and prioritize vulnerability remediation efforts, develop patch management policies, run hygiene improvement processes, report on vulnerability status, and assist with automation and tool tuning.
Proficiency with vulnerability scanning and penetration testing tools, scripting skills, knowledge of security frameworks, experience in system/network administration, and ability to work collaboratively in a cybersecurity team.
US Citizen Only Objectives: The ideal candidate will support the projects and tasks associated with Vulnerability Management Program Technical Direction of Work: Report to the Lead Cybersecurity Engineer within the Cyber Security Program Office (CSPO); including daily guidance and collaboration with others in the Cyber Security Program Office (CSPO). Task and Time Reporting: The project managers measure work performed by the contractor on a task basis. The tasks typically represent 8 to 80 hours of effort with performance being measured at the completion of each of the assigned tasks. Hours will be recorded on a weekly time sheet; progress against planned tasks will be reported weekly. Typically, the work is performed remotely. For the candidate within driving distance of the Lab, there may be rare times to be onsite for in-person meetings, assessments, or presentations. Most of the Business Information Services (BIS) Division works remotely and are rarely onsite. If the candidate is out of state, too far away from the Lab, onsite meetings are not feasible to attend and not required. • Management and Remediation Plan:Collaborate with IT and system administrators to create a patch management policy. • Provide a prioritization of vulnerabilities for remediation based on risk assessment. • Run "Hygiene Improvement Process” (HIP) vulnerability tasks (e.g., generating prioritized list of systems or vulnerabilities to remediate, creating and assigning tickets, follow-up on tickets, enforcing mitigation requirements, reporting). • Develop a schedule, aligned with existing policy, for applying patches and updates to systems and applications. • Monitor the effectiveness of patching efforts and adjust the plan as needed. • Provide bi-weekly, monthly, and quarterly reports of vulnerability and patching efforts to various stakeholders. • Cloud, Container, and DevSecOpsCloud posture and vulnerabilities: • Implement CSPM/agent-based scanning for IaaS/PaaS; cover images, VMs, serverless, and managed services. • Ensure tagging/ownership standards in cloud for routing remediation. • Containers and Images: • Scan images in registries and at build time; block critical vulns from promotion. • Application Dependencies: • Introduce SCA for third-party libraries; integrate auto-dependency updates. • Add SAST/DAST where applicable; tune to reduce false positives. • IaC hygiene: • Scan Terraform/CloudFormation/Kubernetes manifests; enforce guardrails in CI. • Expectation/Deliverables:Assisting and guiding business units with their vulnerability remediation as well as technical debt cleanup. • Create and update Vulnerability risk acceptance/modification review/analysis and approval/non-approval • Document entire workflow of current system in current state and future state • Provide opportunities for automation within current and future state processes (i.e. python, bash, etc.) • Assist in vulnerability tool review/tuning Qualifications: Technical Skills— • Vulnerability Assessment Tools:Proficiency in using vulnerability scanning tools such as Tenable, Nessus, Qualys, OpenVAS, and Nexpose. • Familiarity with penetration testing tools like Metasploit, Burp Suite, and Nmap. • Operating Systems:Strong knowledge of various operating systems, including Windows, Linux, and macOS. • Understanding of system administration and security configurations. • Networking:In-depth understanding of network protocols, architecture, and security. • Experience with network scanning and monitoring tools. • Scripting and Programming:Ability to write scripts in languages such as Python, Bash, or PowerShell to automate tasks and analyze data. • Basic programming skills to understand and analyze code for vulnerabilities. • Security Frameworks and Standards:Familiarity with cybersecurity frameworks and standards such as NIST, ISO 27001, CIS Controls, and OWASP. • Understanding of the Cybersecurity Framework (CSF) and NIST 800-53 controls. • Certifications (Optional):Certified Information Systems Security Professional (CISSP): • Certified Ethical Hacker (CEH): • CompTIA Security+: • Certified Information Security Manager (CISM): • Offensive Security Certified Professional (OSCP): • GIAC Security Essentials (GSEC): • Experience—Practical experience in conducting vulnerability assessments and/or penetration tests. • Experience in system and network administration. • Familiarity with security concerns and vulnerabilities common in an enterprise environment, including application development, IT/OT environments, virtualization, containers, etc. • Staying up to date with the latest cybersecurity threats, vulnerabilities, and best practices. • Strong analytical and problem-solving skills to identify and assess vulnerabilities. • Meticulous attention to detail to ensure thorough assessments and accurate reporting. • Excellent written and verbal communication skills to effectively convey findings and recommendations to technical and non-technical stakeholders. • Ability to work collaboratively with other cybersecurity professionals, IT staff, and external vendors. • Considerable knowledge/experience of assessing security controls. • Experience and skill in conducting audits or reviews of technical systems. • Experience working in a government environment. • Experience working in a distributed IT environment. • Ability to obtain HSPD-12 card for use in two-factor authentication. • Able to work both independently and as a contributing member of a small technical team • Able to disseminate knowledge to current staff.
This job posting was last updated on 9/25/2025