Job was saved successfully.
Job was removed from Saved Jobs.

Job Details

Vulnerability Manager II


Development Manager



Fort Meade, Maryland, United States


Job Description:

Are you ready to work on projects that can potentially change the world? Join us at Leidos, where your most important work is ahead! You will enjoy great benefits such as 5 weeks of Paid Time Off, Flexible Schedules, Discounted Stock Purchase Plans, Unlimited Education and Training Support, Parental Paid Leave and more! If this sounds like a place you can thrive, keep reading!

The Leidos Cyber & SIGINT Solutions Operation is presently seeking a Vulnerability Manager (VM) Skill Level 2 to support one of our most critical DoD missions. Our customer seeks to achieve the vision of modernizing cybersecurity functions to defend information systems and networks throughout the Global Cryptologic Enterprise (GCE) against a broad range of cybersecurity threats. This entails monitoring, detecting, analyzing, securing, and responding to anomalous network activities on all Enterprise Information Systems.

In this role, as the Vulnerability Manager, you will be responsible for:

  • Taking preemptive actions to identify, remediate, and mitigate vulnerabilities to prevent exploitation.
  • Receiving vulnerability input, direction, and guidance from multiple sources and taking directed action to effectively mitigate vulnerabilities in order to protect networks.
  • Leveraging an operational understanding of current vendor remediation’s to prioritize vulnerability escalation procedures and integrating continuous monitoring to ensure mitigations fall within prescribed timelines.

You should possess the following capabilities:

  • Knowledge of cyber threats and vulnerabilities.
  • Determine overall Common Vulnerabilities and Exposures (CVE) priority when threat activity is identified; report incidents that may cause immediate and/or ongoing impact to the environment.
  • Monitor and provide periodic system owners vulnerability mitigation completion updates.
  • Knowledge of system and application security threats, vulnerabilities, and cyber attackers.
  • Monitor external data sources to determine which security issues may have an impact on the enterprise.
  • Identify, develop, and determine mitigation or remediation actions for system and network vulnerabilities.
  • Communicate written and verbal information in a timely, clear, and concise manner.
  • Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
  • Knowledge of system administration, network, operating system hardening techniques, and the risk management process.
  • Knowledge of specific operational impacts of cybersecurity lapses and organization's threat environment.
  • Recommend impact/risk assessments to identify systemic security issues based on the analysis of vulnerability and configuration data.
  • Document and escalate incidents (including event’s history, status, and potential impact for further action); recommend mitigations that will have immediate impact to the environment.
  • Perform after-action reviews of team products to ensure completion of analysis.
  • Lead and mentor team members as a technical expert.

Basic Qualifications

  • Active TS/SCI with polygraph clearance
  • Four (4) or more years of demonstrated experience as a VM of programs and contracts of similar scope, type, and complexity is required.
  • Two (2) years of experience of technical reporting.
  • Two (2) years of experience in network and threat analysis.
  • A technical bachelor’s degree from an accredited college or university may be substituted for two (2) years of VM experience on projects of similar scope, type, and complexity.
  • DoD 8570 compliance Information Assurance Technical (IAT) Level I or Level II certification.
  • Computing Environment (CE) certification (Microsoft OS, Cent OS, or Red Hat OS)
  • Successful completion of the Splunk software training course "Fundamentals 1"


Pay Range:Pay Range - -

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.