Theater Vulnerability Analyst

Goldbelt, Inc.
Honolulu, HI Full Time
POSTED ON 1/25/2024 CLOSED ON 4/3/2024

What are the responsibilities and job description for the Theater Vulnerability Analyst position at Goldbelt, Inc.?

Overview

Global in service but local in approach, the Nisga'a Tek team is committed to high-quality service to honor those who defend us. Nisga'a Tek's work ensures mission assurance and execution for customers and warfighters.

 

Summary:

We are looking for Theater Vulnerability Analyst. This position works directly for the Pacific Aire Forces (PACAF) Defensive Cyber Operations and Mission Assurance Branch but works with various PACAF AOR personnel to execute the following duties and responsibilities.  The position shall provide expert support, analysis and research into exceptionally complex problems, and processes relating to PACAF Theater Vulnerability Management.

Responsibilities

Essential Job Functions:

  • Analyzes PACAF AOR cyber security posture reports
  • Provides PACAF cyber units expertise and fix action guidance
  • Interfaces with base cyber units and provides PACAF leadership a depiction of PACAF Wings ability to:
    • Scan Assured Compliance Assessment Solution (ACAS),
    • Mitigate (via MS System Center Configuration Management (SCCM)/MS Endpoint Configuration Manager (MECM)), and
    • Maintain Host Based point products mandated by the DoD (End Point Security formerly known as HBSS)
    • Maintains proficiency on current and future End Point Security assessment tools
    • Assists PACAF cyber field support team with Vulnerability Management (VM)
    • Provide and/or coordinate vulnerability mentor training (virtual or on-site) to PACAF bases as requested
    • Creates and maintains cyber security/VM management training documentation
    • Interfaces with cyber security technicians/ISSMs to maintain up-to-date reporting to keep PACAF compliant
    • Maintains command wide SCCM & MECM health status
    • Coordinate with Vulnerability Management teams upon scan result analysis
    • Identify patching issues/troubleshooting way ahead
    • Produce report to chain of command informing of patching status
    • Analyzes & produces command wide NIPRNet & SIPRNet weighted vulnerability indicator scores.
    • Produces & disseminates cyber security/vulnerability reports to PACAF staff containing current MAJCOM security posture
    • Utilizes CCRI reports from the DISA J3 website on SIPRNet to advise PACAF Cybersecurity staff of findings and level of risk
    • Assists with cyber operations briefs by preparing and briefing command-wide statuses to the PACAF Director of Air and Cyberspace Operations
    • Creates and conducts PACAF compliance update briefs on command wide cyber security status and assists with troubleshooting cyber security short falls
    • Assists with creating TASKORDs to raise PACAF cyber security posture
    • Tracks status of VM POAMs until completion and reports at risk POAMs to PACAF leadership
    • Augments CRR-M team as required
    • Maintain Internet Protocol (IP) space and asset lists to cover 100% base assets.
    • Maintain MAJCOM ACAS Account with auditing role in order to analyze and produce vulnerability metrics.
    • Maintain SIPRNet PROD Account in order to provide command wide SCCM/MECM patching analysis on SIPRNet.
    • Maintain ELICSAR Account for situational awareness of cybersecurity toolsets used in PACAF.
    • Maintain AFNET Compliance Tracker Account in order to maintain situational awareness of CTOs, MTOs, TCNOs pertaining to vulnerability management
    • Provides Government Representative
    • Contract Personnel Roster
    • Updates to contractor availability
    • Contract Invoices & Funding Expenses
    • Monthly Status Report (MSR)
    • Contractor’s Non-Disclosure Agreements (NDA)
    • Kick-Off Brief & Close-Out Brief
    • Transition Brief
    • Assistance with processing contractors travel requirements
    • Track contract
    • Labor/Events/Workload/Travel schedule & expenses
    • Metrics of Program for Yearly Closeout
  • Provides Cybersecurity SME contractors assistance with:
    • Common access Card (CAC) ID processing and renewals
    • Building Badge processing and renewals
    • DD254
    • TS/SCI processing and renewals
    • Synchronized Pre-deployment and Operational Tracker (SPOT) processing
    • Financial preparation
    • Letters of Identification
    • Travel Estimates/Schedule
  • Ensure all contractors follow all applicable commercial, and government/military standards which include, but are not limited to the following:
    • Department of Defense Instruction 8500.01, Cybersecurity
    • Department of Defense Instruction 8510.01, RMF for DoD Systems
    • Committee on National Security Systems Instruction 1253, Security Categorization and Control Selection for National Security Systems
    • National Institute of Standards and Technology Special Publication 800-53, Security and Privacy Controls for Federal Information Systems and Organizations
    • National Institute of Standards and Technology Special Publication 800-53A, Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans
  • National Institute of Standards and Technology Special Publication 800-39, Managing Information Security Risk: Organization, Mission, and Information System View
    • National Institute of Standards and Technology Special Publication 800-30, Guide for Conducting Risk Assessments
    • All applicable DISA STIGs and Security Review Guides (SRGs)
    • Air Force Instruction (AFI), 17-130 Cyber Security Program Management
    • AFI 17-101, RMF for Air Force Information Technology (IT)
    • AFI 17-110, Information Technology Portfolio Management and Capital Planning and Investment Control

 

#CJ

Qualifications

Necessary Skills and Knowledge:

  • Understand the AF Cyber architecture and PACAF MOBs and GSUs roles
  • Ability to maintain view rights to SIPRNet and NIPRNet vulnerability tools to analyze and compile data for leadership
  • Knowledge and understanding of the latest vulnerability management (scanning, patching, reporting metrics) processes and procedures and be able to maintain currency.
  • Knowledge and understanding of USAF Methods and Procedures Technical Order (MPTO) 00-33-1109A, USCYBERCOM Computer Network Defense (CND)
  • Directives, Task Orders (TASKORDs), Operational Orders (OPORDs) and track Time Compliance Network Orders (TCNO) and Information Assurance Vulnerability Management (IAVM) programs and the like
  • Understanding of Host Base Security System (HBSS)/ePolicy Orchestrator (ePO) functions:
    • How to produce asset lists to identify devices capable of McAfee Agent install
    • How to produce asset lists to identify devices not capable of McAfee Agent install (whitelists).
  • Experience conducting discovery scans to identify unknown base assets
  • Experience analyzing vulnerability scan results and providing way forward to improve cybersecurity posture with patching
  • Experience maintaining credentials to scan for 95% accuracy on base assets to include Program Management Office (PMO) systems
  • Experience conducting vulnerability scanning via ACAS/Tenable.sc on 100% of assets during assigned scan schedule
  • Ability to receive, organize and present vulnerability notifications & statuses
  • Experience with email, and other communication platforms to include but not limited to MS Teams group chats, MS SharePoint site, and VoIP Phones
  • Ability to brief technical information to both technical and non-technical audiences
  • Experience briefing senior leaders and large audiences
  • Excellent Communication skills (Written and Verbal)
  • Ability to Lead
  • PACAF organizational awareness
  • Ability to critically think
  • Proficiency in Microsoft Office Suite products and SharePoint collaborative tools

Minimum Qualifications:

  • Have 3-4 years of experience conducting Network Vulnerability Engineering functions
  • Have 2-3 years of experience and the skills required to execute Federal, National, DoD, USAF CIO, and US State Department Requirements to be able to assess cyber risk, identify mission sets, and defend the mission
  • Have 2-3 years of experience of applying, assessing, and advising MAJCOM staff and Wings on cybersecurity requirements
  • Expertise in the following DoD, AF, DISA, NIST, NIAP and PACAF processes:
    • 3-4 years of experience of DoD approved Scanning Tools (e.g., ACAS)
    • 3-4 years of experience of Microsoft SCCM & MECM
    • Familiarization of End Point Security Point Product requirements
    • Ability to analyze and develop cyber vulnerability information into an understandable presentation.
    • Proficiency in Microsoft Office Suite products and SharePoint collaborative tools to build trend analysis
    • In-depth experience with DISA STIGs and by-product analysis.
  • DoD 8570.1-M certified at IAT Level 3 - Anyone (1) of the following:
    • CASP CE
    • CCNP Security
    • CISA
    • CISSP (or Associate)
    • GCED
    • GCIH
    • CCSP
  • Certificates of completion for the following training
    • Level 1 Anti-Terrorist Training - within the past year
    • Level A Survival, Evasion, Resistance, and Escape (SERE) Training - within the past 1-2 years
    • USFK Training - no time requirement (only required to be taken once)
    • DoD Cyber Awareness Challenge - within the past year
    • Operations Security (OPSEC) Awareness - within the past year
    • https://jkodirect.jten.mil/html/COI.xhtml?course_prefix=PAC&course_number=-US017
    • Derivative Classification IF103.16 - within the past year
    • Force Protection - within the past year
  • TS/SCI security clearance
  • Ability to travel to PACAF MOBs and GSUs to conduct duties and responsibilities - at a minimum of 40% of the time

Preferred Qualifications:

  • Bachelor’s degree in related field

The salary range for this position is $101,250.00-135,000.00 annually.

 

 

Pay and Benefits

At Goldbelt, we value and reward our team's dedication and hard work. We provide a competitive base salary commensurate with your qualifications and experience. As an employee, you'll enjoy a comprehensive benefits package, including medical, dental, and vision insurance, a 401(k) plan with company matching, tax-deferred savings options, supplementary benefits, paid time off, and professional development opportunities.

Technology Vulnerability Analyst I
Black Eagle Defense -
Wahiawa, HI
Senior Vulnerability Analyst - HI
Secure Technologies Group -
Aiea, HI
Technology Vulnerability Analyst 4
Wyetech LLC -
Honolulu, HI

For Employer
Looking for Real-time Job Posting Salary Data?
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

Sign up to receive alerts about other jobs with skills like those required for the Theater Vulnerability Analyst.

Click the checkbox next to the jobs that you are interested in.

  • Auditing Skill

    • Income Estimation: $86,337 - $126,161
    • Income Estimation: $91,761 - $124,963
  • Failure Analysis Skill

    • Income Estimation: $91,538 - $144,067
    • Income Estimation: $101,553 - $129,430
This job has expired.
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at Goldbelt, Inc.

Goldbelt, Inc.
Hired Organization Address Tacoma, WA Full Time
Overview Nisga'a CIOPS provides hands-on experienced services to civilian and DoD programs worldwide. Delivering highly ...
Goldbelt, Inc.
Hired Organization Address Fort Detrick, MD Full Time
Overview: Goldbelt Apex, a part of the Healthcare Technology Transformation Group, is a data-focused company dedicated t...
Goldbelt, Inc.
Hired Organization Address Fort Detrick, MD Full Time
Overview: Goldbelt Apex, a part of the Healthcare Technology Transformation Group, is a data-focused company dedicated t...
Goldbelt, Inc.
Hired Organization Address Fort Detrick, MD Full Time
Overview: Goldbelt Apex, a part of the Healthcare Technology Transformation Group, is a data-focused company dedicated t...

Not the job you're looking for? Here are some other Theater Vulnerability Analyst jobs in the Honolulu, HI area that may be a better fit.

Vulnerability Assessment Analyst

Cymertek, Honolulu, HI

Technology Vulnerability Analyst 1

iNovex Information Systems, Wahiawa, HI

AI Assistant is available now!

Feel free to start your new journey!