Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Close Access Vulnerability Analyst with Security Clearance jobs in Fort Belvoir, Virginia | MyTurn.Careers image - Rise Careers
Job details

Close Access Vulnerability Analyst with Security Clearance jobs in Fort Belvoir, Virginia | MyTurn.Careers

Req ID: 304742 NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a Vulnerability Assessment Security Engineer to join our team in Rockville, Maryland (US-MD), United States (US). NTT DATA is seeking a highly motivated, flexible, organized, and detail oriented Information Security Engineer - Vulnerability Assessment to join our dynamic team at Rockville, MD. If you want to learn, grow, and help then this is the job for you. We support a project/customer that "seeks to better understand, treat, and ultimately prevent infectious, immunologic, and allergic disease seeks fundamental knowledge about the nature and behavior of living systems and the application of that knowledge to enhance health, lengthen life, and reduce illness and disability.” What you do matters and has a significant impact on the medical and scientific communities we serve. Your work here really matters and has a real impact.ResponsibilitiesThis role will be primarily responsible for performing assessments of systems and networks within the network environment to identify where those systems/networks deviate from acceptable configurations or policies, and for measuring the effectiveness of defense-in-depth architecture against known/detected vulnerabilities as per the federal cybersecurity standards & guidelines.• Analyze an organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.• Support authorized penetration testing on enterprise network assets.• Prepare reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions;• Perform vulnerability analysis; Measure the effectiveness of controls against known vulnerabilities.• Work with stakeholders (system administrators and owners) to manage risks\vulnerabilities• Perform technical (evaluation of technologies) and non-technical (evaluation of people and operations) impactisk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, supporting infrastructure, and applications).• Identify systemic security issues based on the analysis of vulnerability and configuration data• Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems, and processes).• Ensure remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.; Provide clear updates to management on vulnerabilities; Investigate, document, and report on the status and emerging trends• Maintain up-to-date vulnerability profiles, including respective detection and countermeasures• Participate in industry task forces and working groups where appropriate to understand current and emerging vulnerabilities to stay up to dateJob Requirements• Minimum 8 years’ experience in Information Security is required along with a minimum of 4 years of hands-on experience in at least 4 of the following:- Application of Risk management frameworks and processes- Use of vulnerability management tools; AppScan, Tenable, Invicti, ForeScout and DbProtect preferred- Creating\improving risk management policies, procedures, and operations- Participating in cross-functional efforts for managing organization-wide risks- Conducting Penetration Tests using Kali and\or CoreImpact- Collecting, organizing, analyzing and reporting updates, alerts, advisories, and bulletins- Use of industry-standards and widely accepted analysis principles and methodsMust know- Risk management processes (e.g., methods for assessing and mitigating risk).- Cybersecurity principles, security models, organizational requirements (w.r.t. confidentiality, integrity, availability, authentication, non-repudiation), cyber threats, risks and vulnerabilities, cryptography and cryptographic key management concepts, host/network access control mechanisms (e.g., ACLs), network access, identity, & access management (e.g., PKIs), Computer networking concepts and protocols, and network security methodologies.- Ethical hacking principles, general attack stages; Specific operational impacts of cybersecurity lapses; programming language structures and logic.- Basic system administration, network, and operating system hardening techniquesMust be- Able to communicate, verbally and in writing, complex technical issues with simplicity & clarity- Strong Interpersonal skills, excellent attention to detail and analytical skills- Able to exercise discretion and maintain confidentiality- Proficient in reporting and answering analytical questions using vulnerability dataEducation/Certifications- Applicants selected will be subject to a Public Trust background security investigation and may need to meet eligibility requirements for access to sensitive information.- A BA or BS degree in MIS, CS, or related cybersecurity discipline (Masters preferred)- Industry standards such as CEH, CRISC, GRCP or related GIAC (preferred but not required)#INDPUBLIC#LI-PSAbout NTT DATANTT DATA is a $30 billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long term success. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure and connectivity. We are one of the leading providers of digital and AI infrastructure in the world. NTT DATA is a part of NTT Group, which invests over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. Visit us at us.nttdata.comNTT DATA endeavors to make https://us.nttdata.com accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact us at https://us.nttdata.com/en/contact-us. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. NTT DATA is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. For our EEO Policy Statement, please click here. If you'd like more information on your EEO rights under the law, please click here. For Pay Transparency information, please click here.
Booz Allen Hamilton Glassdoor Company Review
4.2 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
Booz Allen Hamilton DE&I Review
4.4 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
CEO of Booz Allen Hamilton
Booz Allen Hamilton CEO photo
Horacio D. Rozanski
Approve of CEO

Average salary estimate

$110000 / YEARLY (est.)
min
max
$90000K
$130000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Close Access Vulnerability Analyst with Security Clearance jobs in Fort Belvoir, Virginia | MyTurn.Careers, Booz Allen Hamilton

Are you a keen problem-solver with a passion for security? NTT DATA is on the lookout for a Close Access Vulnerability Analyst with Security Clearance to join our dedicated team in Fort Belvoir, Virginia. If you're eager to make a meaningful difference in the medical and scientific communities by enhancing cybersecurity measures, then this role is for you! In this position, you'll dive deep into the assessment of systems and networks, identifying any discrepancies and measuring the effectiveness of our defense mechanisms against vulnerabilities. Your expertise will be crucial in analyzing cyber defense policies and ensuring compliance with federal regulations. You’ll collaborate with stakeholders to manage risks while preparing comprehensive reports that outline your findings and suggested remediation strategies. The ideal candidate will have at least eight years of experience in information security, alongside a robust understanding of risk management and vulnerability assessment tools. We’re looking for someone who can communicate complex issues clearly and work effectively within a team. Here at NTT DATA, we foster an inclusive and forward-thinking environment where innovation thrives. If you're ready to grow your skills and be part of something bigger, we encourage you to apply and see how your work can contribute to better health outcomes and life quality!

Frequently Asked Questions (FAQs) for Close Access Vulnerability Analyst with Security Clearance jobs in Fort Belvoir, Virginia | MyTurn.Careers Role at Booz Allen Hamilton
What are the main responsibilities of a Close Access Vulnerability Analyst at NTT DATA?

As a Close Access Vulnerability Analyst at NTT DATA, you will be responsible for assessing systems and networks, ensuring they conform to acceptable configurations and policies. You will evaluate cyber defense measures, perform vulnerability analysis, and conduct penetration testing. A key part of your role includes collaborating with stakeholders to manage vulnerabilities, preparing detailed reports on your findings, and recommending effective remediation strategies.

Join Rise to see the full answer
What qualifications are required for a Close Access Vulnerability Analyst at NTT DATA?

To qualify for the Close Access Vulnerability Analyst position at NTT DATA, candidates need a minimum of eight years of experience in information security and at least four years of hands-on experience with tools like AppScan or Tenable. A bachelor's degree in a related field is preferred; advanced degrees and industry certifications such as CEH or CRISC are a plus. Strong analytical and communication skills are essential for success in this role.

Join Rise to see the full answer
What kind of environment does NTT DATA provide for Close Access Vulnerability Analysts?

NTT DATA promotes a dynamic and inclusive work environment for Close Access Vulnerability Analysts. You will have the opportunity to work collaboratively in a team-focused atmosphere while constantly learning and adapting to new challenges in cybersecurity. The company supports personal and professional growth with a focus on innovation and excellence.

Join Rise to see the full answer
What types of tools will I work with as a Close Access Vulnerability Analyst at NTT DATA?

As a Close Access Vulnerability Analyst at NTT DATA, you will use various cybersecurity tools including vulnerability management applications like AppScan, Tenable, and Invicti. Familiarity with penetration testing tools like Kali and CoreImpact is also valuable, as you'll be actively engaged in both technical and non-technical assessment processes to identify potential risks.

Join Rise to see the full answer
How does NTT DATA support the professional development of Close Access Vulnerability Analysts?

NTT DATA is committed to the professional growth of its Close Access Vulnerability Analysts by providing ongoing training, access to the latest industry knowledge, and opportunities to participate in task forces focusing on emerging cybersecurity threats. The company also encourages employees to pursue certifications and further education to enhance their skills.

Join Rise to see the full answer
Common Interview Questions for Close Access Vulnerability Analyst with Security Clearance jobs in Fort Belvoir, Virginia | MyTurn.Careers
What experience do you have in vulnerability assessment and risk management?

When discussing your experience, focus on specific projects where you have identified and mitigated vulnerabilities. Highlight particular tools you've used, such as vulnerability scanners or risk management frameworks, and explain how your contributions led to improved security outcomes.

Join Rise to see the full answer
Can you explain the process of conducting a penetration test?

Describe the stages of a penetration test, including planning, scanning, access, exploitation, and reporting. Share a situation where you successfully conducted a penetration test, detailing the objectives you aimed to achieve and the methods you utilized.

Join Rise to see the full answer
How do you stay updated on the latest cybersecurity threats?

Share specific resources you follow, such as security blogs, industry newsletters, or conferences. Emphasize your commitment to continuous learning and how you apply new knowledge to your professional practice, enhancing your analytical skills against emerging threats.

Join Rise to see the full answer
What strategies do you use to communicate complex technical concepts to non-technical stakeholders?

Emphasize your ability to simplify technical jargon into easy-to-understand terms. Provide an example where you successfully communicated a security issue to a non-technical audience, ensuring they understood the implications and possible solutions.

Join Rise to see the full answer
How do you prioritize vulnerabilities when reporting them?

Explain your approach to assessing the severity of vulnerabilities based on potential impact and exploitability. Discuss any frameworks or methodologies you utilize to categorize risks and prioritize remediation efforts effectively for your stakeholders.

Join Rise to see the full answer
What is your experience with cybersecurity compliance regulations?

Detail any specific regulations you have worked with, such as NIST, HIPAA, or GDPR. Discuss how you ensure compliance within your organization, utilizing tools or frameworks that help you assess and manage compliance risks.

Join Rise to see the full answer
Describe a challenging security project you worked on and how you overcame obstacles.

Choose a project where you faced significant challenges, whether technical or logistical. Discuss the strategies you employed to navigate these challenges, emphasizing your analytical skills and teamwork capabilities.

Join Rise to see the full answer
How would you approach a zero-day vulnerability?

Discuss your understanding of zero-day vulnerabilities and articulate a response plan, including risk analysis, immediate remedial actions, and communication with stakeholders. Emphasize the importance of rapid response and vulnerability management.

Join Rise to see the full answer
What tools do you prefer for vulnerability management and why?

Share your familiarity with various tools and why you prefer certain ones based on their effectiveness and usability. Provide examples of how these tools have supported your work in identifying vulnerabilities and managing risks.

Join Rise to see the full answer
What do you think are the biggest challenges facing cybersecurity today?

Articulate your view of the current landscape of cybersecurity, including evolving threats and emerging technologies. Discuss how staying proactive and adaptive is crucial for addressing these challenges and protecting organizational assets.

Join Rise to see the full answer
Similar Jobs
HR.Coach Hybrid 310 S West St, Raleigh, NC 27603, USA
Posted 4 days ago
Photo of the Rise User
Posted 13 days ago
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Maternity Leave
Paternity Leave
401K Matching
Paid Holidays
Paid Sick Days
Paid Time-Off
Paid Volunteer Time
Health Savings Account (HSA)
Flexible Spending Account (FSA)
Family Coverage (Insurance)
Medical Insurance
Mental Health Resources
Photo of the Rise User
Trendyol Remote Istanbul / Maslak
Posted 10 days ago
Photo of the Rise User
Posted 8 days ago
Photo of the Rise User
Posted 10 days ago
Photo of the Rise User
Mission Cloud Remote Los Angeles, CA
Posted 8 days ago

Empower people to change the world.

227 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 10, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!