Info Assurance / Vulnerabilty Mgmt. Analyst - SR

Info Assurance / Vulnerability Mgmt. Analyst - SR (PENT-19-0030-F)
Bowhead is seeking a senior level Information Assurance (IA) / Vulnerability Management Analyst to develop, execute, and maintain a full-scope IA program that ensures the confidentiality, integrity, and availability of an organization's systems and networks for a government client in Washington DC.
In support of this task, the individual will perform the following activities which include, but are not limited to:
Perform universal serial bus (USB) usage scans using a Government provided scanning tool to identify USB policy violations. Cross-correlate and analyze scan results to identify USB usage policy violations. Investigate and track resolution of all unauthorized USB activity.
Perform audits on network accounts and identify anomalies that are inconsistent with the approved account management naming convention and process, including dormant accounts, disabled accounts, unauthorized shared accounts, and accounts with excessive privileges.
Perform audits on all privileged network accounts on all networks, identifying any new or changed accounts and manually confirming that these changes were authorized.
Report executive-level results of scans and audits to the customer.Requirements? BS in computer science, engineering, mathematics, business or related field of study from an accredited institution.
A minimum of four years' experience in the following areas:
a. Performing Security Test & Evaluation (ST&E) on UNIX, AIX, Linux, or Windows systems using open source and commercial tools such as ACAS, Nmap, Wireshark and Splunk. System Administration (SA) experience with UNIX, AIX, Linux or Windows systems highly desired.
b. Evaluating the results of ST&E, determining the system security risks, identifying existing mitigations, and developing feasible solutions to resolve those risks.
c. Developing security documentation in support of system security certification and accreditation.
Hands on experience with ACAS, running vulnerability scans, performing analysis and documenting vulnerability trends.
Certification as a Security professional at the DOD 8570 IAT-II level. Preferred DOD 8570 IAT-III level.
Must either be or have been determined favorably eligible for SCI within the past 23 months by the Intelligence Community.
SECURITY CLEARANCE REQUIRED: Must currently hold a security clearance at the Secret level. US Citizenship is a requirement for Secret clearance at this location.
Applicants may be subject to a pre-employment drug & alcohol screening and/or random drug screen, and must follow UIC's Non-DOT Drug & Alcohol Testing Program requirements. If the position requires, an applicant must pass a pre-employment criminal background history check. All post-secondary education listed on the applicant's resume/application may be subject to verification.
Where driving may be required or where a rental car must be obtained for business travel purposes, applicants must have a valid driver license for this position and will be subject to verification. In addition, the applicant must pass an in-house, online, driving course to be authorized to drive for company purposes.
UIC is an equal opportunity employer. We evaluate qualified applicants without regard to race, age, color, religion, sex, national origin, disability, veteran status, and other protected characteristics EOE/AA/M/F/D/V. In furtherance, pursuant to The Alaska Native Claims Settlement Act 43 U.S.C. Sec. 1601 et seq., and federal contractual requirements, UIC and its subsidiaries may legally grant certain preference in employment opportunities to UIC Shareholders and their Descendants, based on the provisions contained within The Alaska Native Claims Settlement Act.
All candidates must apply online at www.uicalaska.com, and submit a completed application for all positions they wish to be considered. Once the employment application has been completed and submitted, any changes to the application after submission may not be reviewed. Please contact a UIC HR Recruiter if you have made a significant change to your application. In accordance with the Americans with Disabilities Act of 1990 (ADA), persons unable to complete an online application should contact UIC Human Resources for assistance (http://www.uicalaska.com/contact-us/human-resources/).
UIC Government Services (UICGS / Bowhead) provides innovative business solutions to federal and commercial customers in the areas of engineering, maintenance services, information technology, program support, logistics/base support, and procurement. Collectively, the fast-growing Bowhead Family of Companies offers a breadth of services which are performed with a focus on quality results. Headquartered in Alexandria, VA, we are a fast-growing, multi-million-dollar corporation recognized as one of the top 25 8(a) companies for government contracting.
Cut/Paste this Link to Apply:
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities.
Please view Equal Employment Opportunity Posters provided by OFCCP here.
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
Apply OnlineSend This Job to a Friend
? Ultimate Software

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Info Assurance / Vulnerabilty Mgmt. Analyst - ...
Ft Myer, VA Bowhead / UIC Technical Services
Sr. Info Assurance Engineer/STIG/RMF
Manassas, VA Lockheed Martin
Sr. Info Assurance Engineer/STIG/DIACAP/SCA/Re...
Manassas, VA Lockheed Martin
Sr. Info Assurance Engineer/STIG/RMF with Secu...
Manassas, VA Lockheed Martin Corporation
Information Assurance/Cyber Security Analyst (...
Arlington, VA SAIC