Epicareer Might not Working Properly
Learn More
I

Cyber Vulnerability Engineer

Salary undisclosed

Apply on


Original
Simplified

Job Description

Job Description
East Tennessee company is seeking a Cyber Vulnerability Engineer to join their growing team. This position will require candidates to come onsite and work in a hybrid role. Candidates must be able to obtain a federal security clearance so US citizenship will be required.

Primary Responsibilities:
  1. Provide technical advice and identify cyber security areas in need of improvement, including operational as well as research capabilities
  2. Manage, enhance, and maintain Vulnerability scanning infrastructure and program
  3. Collaborate with Cyber Operations, Cyber Governance, Networking, Enterprise Operations, Cyber Security Research, and other groups across the Laboratory to ensure appropriate configuration and implementation of security tools
  4. Standardize, document, maintain, and automate the network and cyber processes for monitoring, analyzing, and responding to events
  5. Prepare assessments, develop dashboards, document results, and provide status reports and recommendations to the Cyber Security Group Leaders, CISO, and IT management
Basic Qualifications:
  1. Bachelor's Degree in Computer Science or related field or combination of experience and education will be considered for exceptionally technically proficient candidates
  2. Minimum 5-7 years of experience in Cyber Security, specifically cyber engineering and system administration
    1. Experience managing and implementing Vulnerability Scanning tools Such as Nessus, Burp Suite, Nexpose, Nmap
  3. Experience with Hadoop, Accumulo, Elastic Stack, Spark, and/or related technologies
  4. Experience planning, designing, and implementing cyber security improvements and associated metrics to assess impact
  5. Extensive knowledge of information technology and cyber security topics, including network flow, log analysis, cyber security visualization, and programming
  6. Ability to perform log-centric analysis (application logs, operating system events, authentication data, etc.)
  7. Possess strong analytical skills - able to efficiently evaluate data sources and communicate analyses effectively
  8. Able to communicate effectively at all levels of an organization
  9. Ability to work in a fast-paced, enterprise environment
  10. Demonstrated ability to work in a team environment, able to coach and mentor other team members
  11. Must provide outstanding customer support and possess the ability to work well with peer security professionals, researchers, system administrators, desktop support specialists, and help desk specialists
  12. A highly motivated individual who strives for excellence and will drive success regardless of obstacles
Preferred Qualifications:
  1. Comprehensive understanding of cyber threat actors and their corresponding methods/tactics
  2. Advanced understanding of Linux, Unix, Mac and Windows operating systems
  3. Experience with business strategy, improving processes, and making recommendations in business processes and policies for operational metrics and results
  4. Effective at communicating clearly to technical and business audiences
  5. Experience working in large scale (> 5000) employee research environments
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job