Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Vulnerability Analyst image - Rise Careers
Job details

Vulnerability Analyst - job 1 of 2

Vulnerability AnalystJob LocationsUSRequisition ID2024-152939Position CategoryCyber SecurityClearanceAgency ClearanceResponsibilitiesPeraton is seeking a skilled and experienced Vulnerability Analyst to join our Security Operations team. This role requires a candidate with hands-on experience in vulnerability management and assessment within a large, multi-tenant enterprise data center environment. The successful candidate will have in-depth experience with Tenable Security Center and Tenable I.O., leveraging these tools to run comprehensive vulnerability and compliance scans, interpret findings, and engage with operational teams to successfully mitigate identified vulnerabilities.The ideal candidate will also be responsible for setting up and maintaining a continuous monitoring program for vulnerability assessments, ensuring proper integration with the Department of Homeland Security's Continuous Diagnostics and Mitigation (DHS CDM) program, and collaborating closely with the CDM team to ensure accurate reporting and feed capture to the CDM dashboard.If you have a passion for cybersecurity, a strong background in vulnerability assessment, and the ability to work cross-functionally to enhance the security posture of a large enterprise, we encourage you to apply!Day to Day Work Responsibilities:Vulnerability Assessment:• Conduct regular vulnerability assessments, including comprehensive scans for vulnerabilities and compliance issues within a large, multi-tenant enterprise data center environment.• Utilize Tenable Security Center and Tenable I.O. to configure, execute, and analyze vulnerability scans across both internal and external systems.• Interpret scan results, prioritize vulnerabilities based on severity and risk, and engage with the operations team to develop effective remediation strategies.• Continuous Monitoring Program:• Lead the setup, implementation, and management of a continuous vulnerability monitoring program.• Work closely with the DHS CDM team to ensure that relevant data feeds are being captured and accurately reported to the CDM dashboard.• Collaborate with the team to enhance the visibility of vulnerabilities and compliance posture through effective use of automated monitoring and alerting tools.• Vulnerability Remediation & Mitigation:• Act as the subject matter expert in vulnerability remediation processes, providing guidance to the operations and IT teams for mitigating identified vulnerabilities.• Facilitate and track vulnerability remediation efforts, ensuring adherence to established timelines and risk management protocols.• Monitor progress of remediation actions and provide status updates to management, stakeholders, and compliance teams.• Collaboration & Reporting:• Work with cross-functional teams, including infrastructure, operations, and compliance teams, to ensure vulnerabilities are remediated and mitigated in a timely and efficient manner.• Provide detailed, actionable reporting and analysis of vulnerability trends, risk assessments, and remediation status to senior management and stakeholders.• Participate in vulnerability triage meetings, providing technical expertise and guidance to team members and other departments.• Tool & Process Improvement:• Continuously evaluate and improve vulnerability management tools, processes, and techniques.• Provide feedback on improvements to the Tenable Security Center and Tenable I.O. configurations and workflows, ensuring the tools are optimized for the organization's needs.• Stay updated on emerging threats and vulnerabilities, proactively recommending strategies to address new and evolving risks.• Documentation & Compliance:• Maintain thorough documentation of vulnerability management processes, remediation steps, and compliance activities.• Ensure that vulnerability management processes align with industry best practices and compliance requirements, including DHS CDM, PCI-DSS, HIPAA, and others.QualificationsBasic Qualifications:• 2 years with BS/BA; 0 years with MS/MA; 6 years with no degree• Hands-on experience with Tenable Security Center and Tenable I.O., including setting up and running vulnerability and compliance scans, interpreting results, and taking actions to mitigate risks.• Proficiency in networking technologies (TCP/IP, DNS, DHCP, HTTP/HTTPS, etc.), network security protocols, and firewall configurations.• Strong working knowledge of operating systems (Linux, Windows, Unix) and their associated vulnerabilities.• Expertise in using vulnerability scanning tools (preferably Tenable products) and working with enterprise-level vulnerability management platforms.• Knowledge of DHS CDM and experience working with security monitoring and compliance platforms.• Ability to analyze complex vulnerability data, prioritize remediation efforts, and translate findings into actionable insights for both technical and non-technical stakeholders.• U.S. Citizenship required; Must have the ability to obtain and maintain a Public Trust clearancePreferred Qualifications:• Certifications (one or more of the following is a plus):• CISSP (Certified Information Systems Security Professional)• CISA (Certified Information Systems Auditor)• CEH (Certified Ethical Hacker)• CompTIA Security+ or other relevant certifications in security, networking, or vulnerability management.• Bachelor's degree in a STEM field (Science, Technology, Engineering, or Mathematics) or a related discipline, and minimum 5 to 7 years experience in vulnerability management, with a strong background in providing vulnerability assessment services within a large, multi-tenant enterprise data center.• Familiarity with additional vulnerability management platforms (e.g., Qualys, Rapid7 Nexpose) or SIEM tools (e.g., Splunk, IBM QRadar) is a plus.• Experience working with cloud security and vulnerabilities in cloud platforms (e.g., AWS, Azure, Google Cloud) is beneficial.• Strong written and verbal communication skills, including experience creating reports, presentations, and detailed documentation.• Demonstrated ability to work cross-functionally with teams from various disciplines (security, operations, infrastructure, etc.) to achieve common goals and resolve complex issues.• Strong problem-solving skills, with the ability to manage multiple tasks, prioritize effectively, and work under pressure in a fast-paced environment.Working Conditions• Full-time position located at a govt facility in MS or remote• Occasional on-call availability and flexibility may be required for incident response or critical vulnerability assessments.• Collaborative team environment with opportunities for professional growth and training.Peraton OverviewPeraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.Target Salary Range$80,000 - $128,000. This represents the typical salary range for this position based on experience and other factors.We are an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law.

Average salary estimate

Estimate provided by employer
$105500 / ANNUAL (est.)
min
max
$94K
$117K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Vulnerability Analyst, Peraton

Peraton is on the lookout for a dedicated Vulnerability Analyst to join our dynamic Security Operations team in Herndon, VA. If you're passionate about cybersecurity and have hands-on experience in vulnerability management, we want to hear from you! You will play a pivotal role in conducting regular vulnerability assessments, utilizing tools like Tenable Security Center and Tenable I.O. This involves configuring and executing vulnerability scans, interpreting the results, and working alongside operational teams to mitigate any identified risks effectively. Your expertise will also contribute to the development of a continuous monitoring program, which is crucial for upholding our high-security standards. You will collaborate closely with the Department of Homeland Security's Continuous Diagnostics and Mitigation (DHS CDM) program, ensuring accurate reporting and data integration while driving enhancements in our security processes. We are looking for someone with a knack for analyzing complex data and translating those insights into actionable strategies for both technical and non-technical stakeholders. If you have a strong foundation in vulnerability management, an understanding of various operating systems, and excellent communication skills, you'll thrive in this role. At Peraton, we take on challenges that matter and push the boundaries of what’s possible every day. Ready to make a difference? Join us and help shape the future of cybersecurity today!

Frequently Asked Questions (FAQs) for Vulnerability Analyst Role at Peraton
What responsibilities does a Vulnerability Analyst have at Peraton?

As a Vulnerability Analyst at Peraton, your primary responsibilities include conducting regular vulnerability assessments, utilizing Tenable Security Center and Tenable I.O. to scan and analyze vulnerabilities in a multi-tenant enterprise environment. You'll also lead the setup and management of a continuous monitoring program, ensuring integration with the DHS CDM program. Collaboration with cross-functional teams to remediate vulnerabilities and provide detailed reporting will be key aspects of your role.

Join Rise to see the full answer
What qualifications are required to become a Vulnerability Analyst at Peraton?

To become a Vulnerability Analyst at Peraton, you generally need a Bachelor’s degree and at least two years of relevant experience, with hands-on expertise in vulnerability management tools like Tenable Security Center. Knowledge of networking technologies and operating systems such as Linux and Windows is essential. Additionally, having certifications like CISSP, CISA, or CEH is preferred. Strong problem-solving skills and the ability to communicate effectively across teams are also important.

Join Rise to see the full answer
What tools will I work with as a Vulnerability Analyst at Peraton?

In your role as a Vulnerability Analyst at Peraton, you'll primarily work with Tenable Security Center and Tenable I.O. These tools will be essential for running vulnerability and compliance scans. Familiarity with other platforms like Qualys or SIEM tools such as Splunk might also be beneficial in enhancing your effectiveness in this role.

Join Rise to see the full answer
Can I work remotely as a Vulnerability Analyst at Peraton?

Yes! The position of Vulnerability Analyst at Peraton offers opportunities for both on-site work and remote capabilities. This flexibility allows you to manage your work-life balance effectively while contributing to critical cybersecurity efforts.

Join Rise to see the full answer
How does Peraton support employee growth in the role of Vulnerability Analyst?

At Peraton, employee development is a priority. As a Vulnerability Analyst, you’ll benefit from a collaborative team environment with continuous learning opportunities through professional training and the chance to work on challenging projects. Your growth is supported through mentorship, skills training, and exposure to the latest technologies in cybersecurity.

Join Rise to see the full answer
Common Interview Questions for Vulnerability Analyst
Can you explain your experience with Tenable Security Center and how it relates to vulnerability management?

When answering this question, highlight specific projects where you utilized Tenable Security Center, detailing the scanning process, results analysis, and how you collaborated with teams to remediate vulnerabilities. Discuss how you used the tool's features to enhance security posture.

Join Rise to see the full answer
How do you prioritize vulnerability remediation efforts?

In your response, emphasize your approach to evaluating vulnerabilities based on severity, potential impact, and the organization's risk tolerance. Illustrate this with examples of how you’ve effectively prioritized and managed remediation timelines in previous roles.

Join Rise to see the full answer
What steps would you take to set up a continuous monitoring program?

You should outline a systematic approach, including defining goals, identifying necessary tools, integrating with existing frameworks like DHS CDM, and establishing reporting protocols. Providing specific examples of previous setups would strengthen your answer.

Join Rise to see the full answer
Describe a time when you had to communicate complex vulnerability data to non-technical stakeholders.

Prepare to share a specific incident where you effectively distilled complex data into simple, actionable insights. Highlight your communication strategy, the tools you used for presenting the information, and the outcomes of that interaction.

Join Rise to see the full answer
What strategies do you use to stay updated on emerging threats and vulnerabilities?

Discuss your use of industry resources such as blogs, webinars, and networks. Mention participation in industry forums or conferences and how you apply this knowledge in your work.

Join Rise to see the full answer
How would you handle a situation where a high-risk vulnerability is not being addressed promptly?

Demonstrate your conflict resolution skills. Explain your process of escalation, collaborating with operational teams, and how you ensure that vulnerabilities are remediated while maintaining clear communication across departments.

Join Rise to see the full answer
What is your experience with compliance and regulatory requirements related to cybersecurity?

Talk about your understanding of frameworks like DHS CDM, PCI-DSS, and HIPAA. Provide examples of how you've ensured compliance in past roles and the implications of these regulations on vulnerability management.

Join Rise to see the full answer
Can you describe a challenging vulnerability assessment you've performed?

Use this opportunity to narrate a specific scenario where you faced difficulties, the tools you used, the analysis performed, and how the situation was resolved. Focus on the lessons learned and the impact on the organization.

Join Rise to see the full answer
How do you ensure thorough documentation of vulnerability management processes?

Explain your documentation strategy, any tools you use for tracking and recording data, and the importance of thorough documentation for compliance and process improvement. You might reference specific methodologies or frameworks followed.

Join Rise to see the full answer
What role does collaboration play in your approach to vulnerability remediation?

Highlight why collaboration is essential in vulnerability management. Provide examples of cross-functional teamwork that led to successful remediation, emphasizing the importance of building relationships across teams.

Join Rise to see the full answer

Our mission is to protect and promote freedom around the world by Securing our future, Connecting our world, Safeguarding our enterprise, Protecting our borders, Enabling commerce, Enhancing human knowledge, and Protecting our citizens.

188 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, remote
DATE POSTED
December 21, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!