Quadrant, Inc.
Systems - Vulnerability Engineer
Quadrant, Inc., Vienna, Virginia, United States, 22184
Vulnerability Engineer
Washington DC / Hybrid
MUST:
Experience Vulnerability Engineer
Active DoD Secret Clearance and eligible for Top Secret Clearance
Also must pass a T4 Federal background check
7+ years of professional experience managing, maintaining, and administrating operating systems, servers, cloud infrastructure, and file and print environments.
Strong understanding of VMWare and virtual environments.
Advanced knowledge of Microsoft Active Directory and SQL Server.
Strong knowledge of System Center Configuration Manager (SCCM).
Advanced Active Directory (AD) and group policy management experience.
Strong knowledge of NIST-800 framework and security guidelines for Windows servers and clients including DISA STIG.
Experience with performing root cause analysis, risk identification, and risk mitigation.
Understanding of FIPS 140-3 or cryptographic modules and how they are used is desired.
Excellent communication skills both written and verbal.
Able to work well on a team as well as on individual tasks.
Strong documentation skills are a must.
Strong analytical and problem-solving skills.
One active certification: M365E/X, MCSE, VCP, CCNP, LPIC or Linux+.
Bachelor's Degree in related field or 8 additional years of experience is required.
DUTIES:
The ideal candidate will be responsible for the overall health and security of the IT systems and provide system improvements for Federal clients.
Assist Security Operations personnel in developing Plan of Action & Milestones (POAM's) for vulnerabilities requiring long-lead time resolve.
Provide support to system administrators to resolve issues when required, including conducting root cause analysis in response to outages.
Maintain and update environmental documentation, standard operating procedures, and engineering documentation.
Analyze vulnerability reports to identify areas of responsibility for remediation.
Resolve known exploited vulnerabilities, prioritizing critical and high issues.
Facilitate coordination of vulnerability remediations across the team.
Develop and provide recommendations and remediations for vulnerabilities.
Harden Windows OS with secure versions of Transport Layer Security (TLS), and cipher suites according to NIST policy.
Provide on-call support and manage ticket queue.
Demonstrate strong knowledge of vulnerability management tools such as Tenable Nessus and BigFix.
#J-18808-Ljbffr
Washington DC / Hybrid
MUST:
Experience Vulnerability Engineer
Active DoD Secret Clearance and eligible for Top Secret Clearance
Also must pass a T4 Federal background check
7+ years of professional experience managing, maintaining, and administrating operating systems, servers, cloud infrastructure, and file and print environments.
Strong understanding of VMWare and virtual environments.
Advanced knowledge of Microsoft Active Directory and SQL Server.
Strong knowledge of System Center Configuration Manager (SCCM).
Advanced Active Directory (AD) and group policy management experience.
Strong knowledge of NIST-800 framework and security guidelines for Windows servers and clients including DISA STIG.
Experience with performing root cause analysis, risk identification, and risk mitigation.
Understanding of FIPS 140-3 or cryptographic modules and how they are used is desired.
Excellent communication skills both written and verbal.
Able to work well on a team as well as on individual tasks.
Strong documentation skills are a must.
Strong analytical and problem-solving skills.
One active certification: M365E/X, MCSE, VCP, CCNP, LPIC or Linux+.
Bachelor's Degree in related field or 8 additional years of experience is required.
DUTIES:
The ideal candidate will be responsible for the overall health and security of the IT systems and provide system improvements for Federal clients.
Assist Security Operations personnel in developing Plan of Action & Milestones (POAM's) for vulnerabilities requiring long-lead time resolve.
Provide support to system administrators to resolve issues when required, including conducting root cause analysis in response to outages.
Maintain and update environmental documentation, standard operating procedures, and engineering documentation.
Analyze vulnerability reports to identify areas of responsibility for remediation.
Resolve known exploited vulnerabilities, prioritizing critical and high issues.
Facilitate coordination of vulnerability remediations across the team.
Develop and provide recommendations and remediations for vulnerabilities.
Harden Windows OS with secure versions of Transport Layer Security (TLS), and cipher suites according to NIST policy.
Provide on-call support and manage ticket queue.
Demonstrate strong knowledge of vulnerability management tools such as Tenable Nessus and BigFix.
#J-18808-Ljbffr