Job Seekers, Please send resumes to resumes@hireitpeople.com
Short Description:
Responsible for the administration, documentation, maintenance and issue resolution of vulnerability scanning solution.
Complete Description:
The candidate must work with State agencies and other government entities to implement and administer nCircle's continuous vulnerability management solution and related components. They must prepare and present reports, results and recommendations to management. They will be responsible for setting up the vulnerability scan networks and schedules.
Candidate must be:
• Self-managed and able to work well independently with minimal direction / supervision
• Be able to work independently and within a team environment
• Self-motivated – self-starter who is goal and detail oriented, and who is results driven
• Manage expectations
• Possess excellent interpersonal communication skills (oral and written)
• Rapidly adjust perspective between macro and micro view of project, deliverables, and people
• Readily adapt to change and setbacks.
• Expected to complete assignments timely and submit weekly status reports indicating progress on assigned tasks, performance against assigned project due dates, and identification and suggested resolution for issues having the potential to adversely impact the project.
• Be able to start within 30 days of offer
Skills:
Skill |
Required / Desired |
Amount |
of Experience |
2 -4 year degree or with major in computing systems; or equivalent military or professional experience focused on computing syste |
Required |
5 |
Years |
Enterprise IT infrastructure administration – i.e. server administration, network administration, storage systems administration, directory management |
Required |
3 |
Years |
Experience working with networks and writing network notation – demonstrable knowledge of TCP/IP networks |
Required |
3 |
Years |
Experience analyzing test results or reports to identify trends, issues, opportunities and report on those findings to management |
Required |
3 |
Years |
Proficient in MS Office 2007 / 2010 proficient (Word, Excel, PowerPoint, Outlook) |
Required |
|
|
Strong technical knowledge of Windows and Unix environments |
Required |
|
|
Broad base of knowledge across the technology spectrum that include: networking protocols, security scanning products, anti-virus solutions |
Required |
|
|
Security systems administration experience |
Desired |
|
|
Hands-on experience with network, system, and application vulnerability assessment and penetration testing |
Desired |
|
|
Knowledge of security audit tools, data logging tools, operating systems, and databases |
Desired |
|
|
Security systems administration experience |
Desired |
|
|
Computing certification or designation |
Nice to have |
|
|
Security certification or designation |
Nice to have |
|
|