The primary mission of the United States Mint (Bureau under United States Department of Treasury) is to serve the American people by manufacturing and distributing circulating, precious metal and collectible coins and national medals, and providing security over assets entrusted to us.
Its cyber security program is one of the United States Mint's critical needs and one of the most pressing priorities for the bureau's Information Technology Department (ITD). The Information Technology Department is responsible for securing not only standard information technology infrastructure, but also an Industrial Control System (ICS)/Supervisory Control and Data Acquisition (SCADA) infrastructure. ISD is responsible for maintaining regulations and requirements governing federal IT security, addressing the increasing frequency and sophistication of cyber-attacks, and supporting an overarching effort of continuous organizational improvement and maturity. ITD maintains a continuous monitoring policy and a heightened focus on cyber security compliance and operations.
The Leidos USMINT SOC Program has a current need for a Vulnerability Analyst. The Vulnerability Analyst will be responsible for discovering cybersecurity risks, prioritizing assets, and utilizing remediation/mitigation techniques. This role will serve as one of the focal points to support the bureau's efforts to reduce vulnerabilities, drive and track remediation and mitigation, and foster an environment of risk management to prioritize and tackle threats to business problems.
Tactically guide the Vulnerability Management (VM) Plan, to coordinate, monitor and support activities in the areas of the VM program, security patch and remediation management
Provide status reports to CISO and ISD Branch Chiefs related to VM metrics, key risk indicators, trending, and compliance reports to the CISO, ISD leadership, and ITD system owners
Perform information system security vulnerability scans to discover and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system components
Perform compliance scans to analyze configurations and facilitate implementation of configurations and hardening settings for networks, operating systems, applications, databases, and other information system components
Engage with ITD VM stakeholders, to include ITD systems owners, ITD management, and auditors, to facilitate vulnerability discovery and remediation
Validate remedial actions and ensure compliance with information security policy and regulatory requirements
Use automated tools (e.g. Nessus) to pinpoint vulnerabilities and reduce time-consuming tasks
Use manual testing techniques and methods to gain a better understanding of the environment and reduce false negatives Develop, test and modify custom scripts and applications for vulnerability testing
Facilitate and coordinate vulnerability assessment and scans, reviews of assessment results, patching, and remediation activities related to workstations, servers, storage, databases, appliances, web applications and network devices
Analyze assessment results and threat feeds to properly react to security weaknesses or vulnerabilities
Perform ad-hoc data manipulations, clean-ups, and reporting using large complex data sets for rapid security responses.
Develop reports using data that is hosted in multiple sources/tools (e.g. spreadsheets, databases) and communicate clearly to leadership and other cyber teams
Propose VM concepts/solutions and prepare presentations
Develop risk-based mitigation strategies for our client's networks, operating systems, and applications
Compile and track vulnerabilities and mitigation results to quantify program effectiveness for metrics purposes
Review and define requirements for information security solutions and document security breaches and the extent of the damage caused by the breaches through extensive reports
Ability to continuously research emerging threats to the environment to disseminate the information to all stakeholders, immediately assess the known environment for presence of the vulnerability, and work with the enterprise networking teams to proactively block exploitation within the environment.
Proficient in vulnerability scanning, tracking and remediation techniques.
Conducts, operates, and maintains assessments and the resulting Vulnerability Assessment (VA) data and reports
Conducts Host-based and Network Vulnerability Assessments on a wide variety of endpoints to include ICS/OT, Database and Web based applications.
At least 6 years of experience in Vulnerability Analysis
At least 6 years of experience querying, analyzing and working with vulnerability data
At least 6 years of experience working with Vulnerability scanning, reporting, and Network tools (Nessus, SecurityCenter, Qualys, NMAP)
Familiarity of Threat Classification and CVE
Firm understanding of network security controls and network and infrastructure
Network Devices and Routing
Knowledge in system security architecture and security solutions
Knowledge in networking, phishing, and endpoint security
Proven analytical and problem-solving skills
Self-motivated to improve knowledge and skills
Works well both in a team environment and independently
CISSP preferred or an industry acknowledged security certification
Ability to obtain Public Trust clearance
Education & Experience:
Pay Range $94,250.00 - $145,000.00 - $195,750.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.