Job was saved successfully.
Job was removed from Saved Jobs.

Job Details

Cybersecurity Vulnerability Engineer ( R-00089898-OTHLOC-6314 )


Applications Engineer



Reston, Virginia, United States


Job Description:

The primary mission of the United States Mint (Bureau under United States Department of Treasury) is to serve the American people by manufacturing and distributing circulating, precious metal and collectible coins and national medals, and providing security over assets entrusted to us.

Its cyber security program is one of the United States Mint’s critical needs and one of the most pressing priorities for the bureau’s Information Technology Department (ITD). The Information Technology Department is responsible for securing not only standard information technology infrastructure, but also an Industrial Control System (ICS)/Supervisory Control and Data Acquisition (SCADA) infrastructure. ISD is responsible for maintaining regulations and requirements governing federal IT security, addressing the increasing frequency and sophistication of cyber-attacks, and supporting an overarching effort of continuous organizational improvement and maturity. ITD maintains a continuous monitoring policy and a heightened focus on cyber security compliance and operations.

The Leidos USMINT SOC Program has a current need for a Vulnerability Analyst. The Vulnerability Analyst will be responsible for discovering cybersecurity risks, prioritizing assets, and utilizing remediation/mitigation techniques. This role will serve as one of the focal points to support the bureau’s efforts to reduce vulnerabilities, drive and track remediation and mitigation, and foster an environment of risk management to prioritize and tackle threats to business problems.

Primary Responsibilities:

  • Tactically guide the Vulnerability Management (VM) Plan, to coordinate, monitor and support activities in the areas of the VM program, security patch and remediation management

  • Provide status reports to CISO and ISD Branch Chiefs related to VM metrics, key risk indicators, trending, and compliance reports to the CISO, ISD leadership, and ITD system owners

  • Perform information system security vulnerability scans to discover and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system components

  • Perform compliance scans to analyze configurations and facilitate implementation of configurations and hardening settings for networks, operating systems, applications, databases, and other information system components

  • Engage with ITD VM stakeholders, to include ITD systems owners, ITD management, and auditors, to facilitate vulnerability discovery and remediation

  • Validate remedial actions and ensure compliance with information security policy and regulatory requirements

  • Use automated tools (e.g. Nessus) to pinpoint vulnerabilities and reduce time-consuming tasks

  • Use manual testing techniques and methods to gain a better understanding of the environment and reduce false negatives Develop, test and modify custom scripts and applications for vulnerability testing

  • Facilitate and coordinate vulnerability assessment and scans, reviews of assessment results, patching, and remediation activities related to workstations, servers, storage, databases, appliances, web applications and network devices

  • Analyze assessment results and threat feeds to properly react to security weaknesses or vulnerabilities

  • Perform ad-hoc data manipulations, clean-ups, and reporting using large complex data sets for rapid security responses.

  • Develop reports using data that is hosted in multiple sources/tools (e.g. spreadsheets, databases) and communicate clearly to leadership and other cyber teams

  • Propose VM concepts/solutions and prepare presentations

  • Develop risk-based mitigation strategies for our client's networks, operating systems, and applications

  • Compile and track vulnerabilities and mitigation results to quantify program effectiveness for metrics purposes

  • Review and define requirements for information security solutions and document security breaches and the extent of the damage caused by the breaches through extensive reports

Basic Qualifications:

  • Ability to continuously research emerging threats to the environment to disseminate the information to all stakeholders, immediately assess the known environment for presence of the vulnerability, and work with the enterprise networking teams to proactively block exploitation within the environment.

  • Proficient in vulnerability scanning, tracking and remediation techniques.

  • Conducts, operates, and maintains assessments and the resulting Vulnerability Assessment (VA) data and reports

  • Conducts Host-based and Network Vulnerability Assessments on a wide variety of endpoints to include ICS/OT, Database and Web based applications.

  • At least 6 years of experience in Vulnerability Analysis

  • At least 6 years of experience querying, analyzing and working with vulnerability data

  • At least 6 years of experience working with Vulnerability scanning, reporting, and Network tools (Nessus, SecurityCenter, Qualys, NMAP)

  • Familiarity of Threat Classification and CVE

  • Firm understanding of network security controls and network and infrastructure

  • Network Devices and Routing

  • Cloud Services

  • Knowledge in system security architecture and security solutions

  • Knowledge in networking, phishing, and endpoint security

  • Proven analytical and problem-solving skills

  • Self-motivated to improve knowledge and skills

  • Works well both in a team environment and independently

  • CISSP preferred or an industry acknowledged security certification

  • Ability to obtain Public Trust clearance

Education & Experience:

  • Requires BS degree with 8+ years of prior relevant work experience within IT/Cybersecurity.

Pay Range:Pay Range $94,250.00 - $145,000.00 - $195,750.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.