Lead Vulnerability Analyst jobs in United States
cer-icon
Apply on Employer Site
company-logo

State of Ohio · 1 day ago

Lead Vulnerability Analyst

The Ohio Department of Administrative Services (DAS) is dedicated to supporting the state government's priorities and ensuring secure data and technology resources. The Lead Vulnerability Analyst will evaluate IT policies and practices, lead cybersecurity projects, and develop solutions to enhance the agency's cybersecurity posture.

Automotive

Responsibilities

Leads IT driven change effort
Participates in &/or leads activities to achieve project tasks/meet deadline
Monitors & evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure that they provide the intended level of protection
Participate in the development or modification of the computer environment cybersecurity program plans & requirements
Serves as project lead (engineer) for security projects
Assist in developing programs, projects, goals & priorities with manager &/or supervisor
Leads/participates in troubleshooting efforts for agency/enterprise incidents
Works with IT Architect staff, CIO or IT Managers to design solutions that meet the agency’s requirements
Assists analysis of the solution design’s business case
Authors’ portions of the solution business case
Leads/participates in agency/enterprise incidents response efforts
Plans & conducts formal mentorship & training activities for peers &/or lower-level staff via verbal instruction or technical documentation
Performs other duties as assigned

Qualification

Vulnerability ManagementCybersecurityNetwork Security ArchitecturePenetration TestingNetwork Analysis ToolsProblem SolvingCritical Thinking

Required

Completion of undergraduate core coursework in computer science; 24 mos. trg. or 24 mos. exp. in computer data security either through monitoring system/network traffic for anomalous activity, systems development or controlling accessibility of data
Or 12 mos. exp. as Enterprise Information Security Professional 1, 69981
Or equivalent of Minimum Class Qualifications For Employment noted above
Job Skills: Cybersecurity, Information Technology, Problem Solving, Critical thinking
Knowledge: Vulnerability Management
Knowledge: Content development
Knowledge: Different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.)
Knowledge: Different operational threat environments (e.g., first generation [script kiddies], second generation [non-nation state sponsored], & third generation [nation state sponsored])
Knowledge: General attack stages (e.g., foot printing & scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.)
Knowledge: How traffic flows across the network [e.g., Transmission Control Protocol (TCP) & Internet Protocol (IP), Open System Interconnection Model (OSI), Information Technology Infrastructure Library, v3 (ITIL)]
Knowledge: IA principles & organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
Knowledge: Interpreted & compiled computer languages
Knowledge: Agency specific local specialized system requirements (e.g., critical infrastructure systems that may not be used standard IT) for safety, performance, & reliability
Knowledge: Network access, identity & access management (e.g., public key infrastructure, PKI)
Knowledge: Network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), & directory services
Knowledge: Network security architecture concepts including topology, protocols, components, & principles (e.g., application of Defense-in-Depth)
Knowledge: Agency penetration testing principles, tools, & techniques (e.g., core impact, metasploit, neosploit, etc.)
Knowledge: Programming language structures & logic
Knowledge: Agency relevant laws, policies, procedures, or governance as they relate to work that may impact critical infrastructure
Knowledge: System & application security threats & vulnerabilities (e.g., buffer overflow, mobile code, cross-site)
Knowledge: Understand regulatory compliance & audit standards
Skills: Applying host/network access controls (e.g., access control list)
Skills: Assessing the robustness of security systems & designs
Skills: Conducting vulnerability scans & recognizing vulnerabilities in security systems
Skills: Evaluating the trustworthiness of the supplier &/or product
Skills: Mimicking threat behaviors
Skills: Performing damage assessments
Skills: Performing packet-level analysis (e.g., Wireshark, tcpdump, etc.)
Skills: Use of penetration testing tools & techniques
Skills: Use of social engineering techniques
Skills: Network analysis tools to identify vulnerabilities. (e.g. Qualys, Nessus, etc.)
Skills: Using application analysis tools to identify vulnerabilities. (e.g. Checkmarx, Qualys, etc.)
Abilities: Interpret & incorporate data from multiple tool sources
Abilities: Identify & Gather facts & formulate reasonable explanation & valid conclusions
Abilities: Work in a team environment
Abilities: Successfully pass the State of Ohio Computer [SOCC] background check

Benefits

Medical Coverage
Free Dental, Vision and Basic Life Insurance premiums after completion of eligibility period
Paid time off, including vacation, personal, sick leave and 11 paid holidays per year
Childbirth, Adoption, and Foster Care leave
Education and Development Opportunities (Employee Development Funds, Public Service Loan Forgiveness, and more)
Public Retirement Systems (such as OPERS, STRS, SERS, and HPRS) & Optional Deferred Compensation (Ohio Deferred Compensation)

Company

State of Ohio

company-logo
Employment with the State of Ohio is more than ‘just a job’ – it is a privilege to serve our families, friends and neighbors who rely on us throughout our great state.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Beverlyn Johns, MS
Deputy Chief Operating Officer
linkedin
leader-logo
Holly Drake
State Chief Information Security Officer
linkedin
Company data provided by crunchbase