Vulnerability and Application Scanning Lead - REMOTE at NTT DATA
Fort Knox, Kentucky, United States -
Full Time


Start Date

Immediate

Expiry Date

02 Jan, 26

Salary

0.0

Posted On

04 Oct, 25

Experience

10 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Vulnerability Assessment, Application Scanning, Cybersecurity, Risk Analysis, Compliance, Mitigation Strategies, Incident Response, Java, .Net, Analytical Skills, Problem-Solving, Communication Skills, Quality Assurance, Project Management, Technical Guidance, Knowledgebase Development

Industry

IT Services and IT Consulting

Description
In the role of Vulnerability and Application Scanning Lead you will perform correlation and scanning of application code (Java, .Net, etc.) with Government provided tools and other prescribed Cybersecurity tools to analyze risk and assess compliance across all systems, applications, and authorization boundaries. You will Provide mitigation and remediation strategies to application developers to address vulnerabilities in code using current information security technology disciplines and practices to ensure the confidentiality, integrity, and availability of corporate information assets in accordance with established standards and procedures. As part of your duties you will develop and maintain a knowledgebase on changing regulatory, threat, and technology landscapes to continually develop or maintain security policies and standards, and ensure compliance throughout the organization. Additionally, as one of the Key Persons you will support execution of contract transition to ensure minimum service disruption to vital business and no service degradation during and after transition; ensure continuity of services while helping onboard personnel and jointly inventory intellectual and real property. You will perform enterprise-wide risk analysis and vulnerability assessments to assess the command security posture. You will be responsible for coordination and development of recommendations on Cybersecurity incident response, mitigation, remediation actions, or risk determination to protect command information systems from damage, destruction, or alteration IAW all required regulations and directives. You will ensure compliance with statutory and regulatory requirements supporting boundary authorizations IAW RMF. You will also provide recommendations and perform logging, correlation, and scanning with provided Government and Cybersecurity tools (Assured Compliance Assessment Solution (ACAS) and Army Endpoint Security System (AESS)). As part of your duties you will analyze and correlate risk impact and compliance across all Customer systems, applications, and authorization boundaries all while providing surge support, technical guidance, and expertise in the areas of Cybersecurity to support Customer, Mission Partners, IMOs, ISSOs, IS Owners, Software Developers, Network System, and Database Administrators IAW all related cyber regulations and directives; provide results in reports, briefs, and deliverables as required to the appropriate Government representative. 10 years of relevant experience performing these functions BA/BS degree Ability to obtain a secret clearance prior to start. IA Cert Level (DoD 8570.01): IAT Level III (CISSP, GASP+, GCED, or GCIH recommended) 1 year of experience with DoD cybersecurity processes and regulations. Strong analytical and problem-solving skills. Experience in achieving excellent quality assurance goals Excellent written and verbal communication skills presenting material to senior executive personnel Ability to organize, direct, and manage operation support functions involving multiple complex and inter - related projects and / or tasks.
Responsibilities
The Vulnerability and Application Scanning Lead will perform correlation and scanning of application code to analyze risk and assess compliance across systems. They will also provide mitigation strategies to developers and ensure compliance with cybersecurity regulations.
Loading...