Network Vulnerability Engineer

$80,000 - $95,000/Yr

Goldbelt Incorporated - Honolulu, HI

posted 5 months ago

Full-time
Honolulu, HI
Transportation Equipment Manufacturing

About the position

Nisga'a CIOPS is seeking a Network Vulnerability Engineer to join our team at Joint Base Pearl Harbor Hickam (JBPHH). This position is critical in ensuring the security and integrity of our network systems by managing vulnerabilities through a structured approach. The Network Vulnerability Engineer will be responsible for vulnerability management, which includes scanning, patching, and reporting metrics. The role requires adherence to various directives and guidelines, including USAF MPTO 00-33-1109A and USCYCOM CND Directives, ensuring compliance with established protocols and standards. The primary focus of this position is to improve cybersecurity across the base by identifying and mitigating vulnerabilities. The engineer will create, maintain, and distribute ACAS Reports to the chain of command points of contact (POCs) and produce reports that inform the command of the patching status. Conducting discovery scanning to identify unknown base assets and performing vulnerability scanning via ACAS/Tenable.sc on 100% of assets during the assigned scan schedule is essential. The engineer will also coordinate with Microsoft SCCM/MECM teams to analyze scan results monthly, identifying patching issues and troubleshooting as necessary. Additionally, the role involves maintaining an accurate inventory of IP space and asset lists to ensure coverage of all base assets. The engineer will be responsible for maintaining credentials to achieve 95% accuracy on base assets, including PMO systems, and producing asset lists to identify devices that are not capable of McAfee Agent installation. This position is vital for enhancing the overall cybersecurity posture of the organization and ensuring that all systems are adequately protected against potential threats.

Responsibilities

  • Responsible for vulnerability management including scanning, patching, and reporting metrics.
  • Follow USAF MPTO 00-33-1109A, USCYCOM CND Directives, TASKORDs, OPORDs, and track TCNO/IAVMs.
  • Create, maintain, and distribute ACAS Reports to chain of command POCs.
  • Produce reports to inform the chain of command of patching status.
  • Conduct discovery scanning to identify unknown base assets.
  • Conduct vulnerability scanning via ACAS/Tenable.sc on 100% of assets during assigned scan schedule.
  • Coordinate with Microsoft SCCM/MECM teams upon scan result analysis (monthly) to identify patching issues and troubleshooting.
  • Maintain IP space and asset lists to cover 100% of base assets.
  • Maintain credentials to scan for 95% accuracy on base assets, including PMO systems.
  • Produce asset lists to identify devices not capable of McAfee Agent install.

Requirements

  • Air Force Network Infrastructure knowledgebase and current device type understanding.
  • Understanding of HBSS/ePO functions.
  • ACAS Certificate of training and experience within the last 2-3 years.
  • DODI 8570 Requirement IAT Level 2.
  • SECRET clearance eligible.

Benefits

  • Medical insurance
  • Dental insurance
  • Vision insurance
  • 401(k) plan with company matching
  • Tax-deferred savings options
  • Supplementary benefits
  • Paid time off
  • Professional development opportunities
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service