Create a Job Alert.

Enter your email below to save this search and receive job recommendations for similar positions.
Thank you. We'll send jobs matching these to
You already suscribed to this job alert.
No Thanks
US
What job do you want?

Information Security Analyst Advisor - Vulnerability Management job in Colorado Springs at Base-2 Solutions, LLC

Create Job Alert.

Get similar jobs sent to your email

Apply to this job.
Think you're the perfect candidate?
Apply on company site

You’re being taken to an external site to apply.

Enter your email below to receive job recommendations for similar positions.
Information Security Analyst Advisor - Vulnerability Management at Base-2 Solutions, LLC

Information Security Analyst Advisor - Vulnerability Management

Base-2 Solutions, LLC Colorado Springs, CO Full Time
Apply on company site

Create Job Alert.

Get similar jobs sent to your email

Required Security Clearance: Top Secret/SCI

City: Colorado Springs

State/Territory: Colorado

Travel: None

Potential for Teleworking: No

Schedule: Full Time DoD 8570 IAT Requirement: IAT II (Security+, CySA+, CCNA Security, GICSP, GSEC, SSCP) DoD 8570 IAM Requirement: None DoD 8570 IASAE Requirement: None DoD CSSP Requirement: CSSP Auditor (CySA+, CEH, CISA, GSNA)

Responsible for strengthening the defensive posture and cyber defense operational readiness of an IT Enterprise, our Enterprise Cyber Network Defense (ECND) program defends and protects Government assets from external Cyber Security attacks and Insider Threats that can potentially cause or create data, systems, networks, and personnel vulnerabilities.

Functional Duties

  • Install, configure, and maintain the Assured Compliance Assessment Solution (ACAS) framework and associated product suites.
  • Assist with major version upgrades of Assured Compliance Assessment Solution (ACAS) servers and clients.
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
  • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
  • Work with security engineering team to integrate new capabilities, plan lifecycle replacements, and provide input into the security architecture roadmaps.
  • Maintain system documentation.
  • Prepares incident reports of analysis methodology and results.

Standard Characteristics

  • Identify and manage network and system vulnerabilities and security events
  • Receive, acknowledge, disseminate, track, report (daily/weekly, and update vulnerability management (VM) alerts, vulnerability assessments, red/blue team events, security incidents, and the VM common operating picture (VM COP)
  • Provide inspection services across the enterprise on behalf of the organization’s Special Enclave (SE) program manager
  • Support or perform global DoD inspections of GENSER and SE (e.g., JWICS) services to ensure compliance to DoDI 8530 standards

Skills and Tasks

  • Exceptionally Complex, Inter-Discipline, Inter-Organizational. Can perform tasks of senior level technicians, specialists, and or managers not performed at Level 3 due to the size and/or complexity of the tasks.

Leadership/Management

  • May work individually or as a key member of a senior leadership team. Oversees and monitors performance across several disciplines, and when required, takes steps to resolve issues.

Guidance

  • Provides expert guidance and direction to Government and Vendor senior level technicians and managers. Directs multiple contractor and subcontractor teams through to project completion.

Training and Certifications

  • DoD 8570 compliance or information assurance certification commensurate with technical objectives and services required within the task order. Applicable software or hardware training and certifications commensurate with the technical objectives, services required, and IT environment specified within the task order.

Capabilities and additional Requirements

  • Apply Standard Characteristics of Labor Category Capability Levels.

Education and Experience

  • HS/GED + 12 years
  • Associates Degree + 10 years
  • Bachelor’s Degree + 8 years
  • Master’s Degree + 6 years
  • PhD + 4 years
 

Recommended Skills

Certified Ethical Hacker
Systems And Network Auditor Certification
Giac Security Essentials Certification
Vulnerability Scanning
Cyber Security
Certified Information Security Manager

Recommended Jobs

Information Security Analyst Advisor - Vulnerability Management
Base-2 Solutions, LLC Colorado Springs Full Time
Applications Architect
Robert Half Colorado Springs
$59.38 - $68.75/Hour
Sr Commercial Security Consultant
ADT Colorado Springs
Apply to this job.
Think you're the perfect candidate?
Apply on company site

Help us improve CareerBuilder by providing feedback about this job: Report this job

Report this Job

Once a job has been reported, we will investigate it further. If you require a response, submit your question or concern to our Trust and Site Security Team

Job ID: 350

CareerBuilder TIP

For your privacy and protection, when applying to a job online, never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction. Learn more.

By applying to a job using CareerBuilder you are agreeing to comply with and be subject to the CareerBuilder Terms and Conditions for use of our website. To use our website, you must agree with the Terms and Conditions and both meet and comply with their provisions.