AAC is seeking Senior Security Analyst / Vulnerability Management Lead to join our security compliance team. In this role, you will work closely with the Information Systems Security Officer (ISSO) and play a critical part in safeguarding organization’s IT infrastructure. You will be part of a broader IT program that provides end-to-end support—including help desk, systems, network, incident response and security services—ensuring the availability, integrity, and confidentiality of mission-critical systems.
Responsibilities include, but are not limited to:
• Lead the agency’s vulnerability management lifecycle using Tenable.sc, Tenable.io, Nessus Manager, and Nessus scanners (on-prem and cloud).
• Analyze, prioritize, and track remediation of vulnerabilities in coordination with IT operations and system owners.
• Maintain scan schedules, asset groups, scan policies dashboards, and reports tailored to agency infrastructure and communicate risk posture and remediation progress to relevant infrastructure, application, and cloud teams to remediate vulnerabilities.
• Define the scanner and security center architecture, refine data flows and synchronizations, tune scanning configurations to minimize false positives and ensure the best coverage.
• Develop and maintain documentation for system setup, operation, vulnerability management processes, exceptions, and remediation tracking.
• Support implementation of security projects that require compliance with relevant government policies or standards.
• Act as SME for vulnerability management tools and processes.
• Ensure systems and practices comply with FISMA and FedRAMP related Security Assessment and Authorization (SA&A) and compliance for the organization’s IT programs.
• Assist in coordination, implementation, communication, and enforcement of the organization’s IT security policies.
• Support incident response.
The position requires on-site presence 3 to 5 days per week. The on-site requirements are subject to change based on the needs and requirements of the organization.
Required Skills
Required Experience
Requirements:
• Requires bachelor’s degree in computer science, cyber security, engineering, or a related technical field. Additional experience and relevant certifications may be considered in leu of a degree.
• 5-7 years of progressive and related experience in IT security with at least 3 years in vulnerability management.
• Expert knowledge of IT security vulnerabilities and risk assessments with the ability to explain the risks associated with them to executives, program, and technology staff.
• Expert knowledge of Tenable.sc (on-prem) and Tenable.io (cloud).
• Strong knowledge of vulnerability management lifecycle, patch management, and risk scoring (e.g., CVSS2).
• Familiarity with cloud platforms (AWS and GCP) and hybrid environments.
• Understanding of Windows, Linux/Unix, and network devices security hardening.
• Ability to work with program staff, executives, security application vendors and technology staff to achieve IT security goals and objectives.
• Experience developing and maintaining Security Assessment and Authorization (SA&A) documentation for large IT systems for the Federal Government.
• Excellent working experience in applying FISMA, and FedRAMP processes and policies to information systems.
• Experience with Checkmarx and Checkmarx One (SaaS). Migration experience to Checkmarx One is desirable.
• Strong communication skills (both technical and non-technical) and ability to collaborate across IT, security, and business units.
• Ability to effectively communicate orally and in writing.
• Experience supporting a nationwide mid-to large Federal agency enterprise is a plus.
• CISSP certification required (or ability to obtain within 6 months of start).
• Must be able to obtain an agency suitability clearance prior to start.
Desired Qualifications:
• Experience with scripting and automation (e.g., Python, PowerShell) to automate scanning tasks, reporting, and API integrations; administration and operation of security scanning and vulnerability management platforms such as Nessus.
• Deep expertise with SIEM platforms and integration of vulnerability data into enterprise monitoring.
• Understanding of the Secure Software Development Life Cycle.
• Master’s degree or additional security or cloud certifications (e.g., CISM).