Job Seekers, Please send resumes to resumes@hireitpeople.com
Short Description:
Responsible for the administration, documentation, maintenance and issue resolution of vulnerability scanning solution. Will assist customers with vulnerability remediation
Complete Description:
The candidate must work with State agencies and other government entities to implement and administer nCircle's continuous vulnerability management solution and related components. They must prepare and present reports, results and recommendations to management. They will be responsible for setting up the vulnerability scan networks and schedules.
Candidate must be:
• Self-managed and able to work well independently with minimal direction / supervision
• Be able to work independently and within a team environment
• Self-motivated – self-starter who is goal and detail oriented, and who is results driven
• Manage expectations
• Possess excellent interpersonal communication skills (oral and written)
• Rapidly adjust perspective between macro and micro view of project, deliverables, and people
• Readily adapt to change and setbacks.
• Expected to complete assignments timely and submit weekly status reports indicating progress on assigned tasks, performance against assigned project due dates, and identification and suggested resolution for issues having the potential to adversely impact the project.
• Be able to start within 30 days of offer
Skills:
Skill |
Required / Desired |
Amount |
of Experience |
Enterprise IT infrastructure administration – i.e. server administration, network administration, storage systems administration, directory management |
Required |
3 |
Years |
Experience working with networks and writing network notation – demonstrable knowledge of TCP/IP networks understanding computer and network security |
Required |
3 |
Years |
Experience analyzing test results or reports to identify trends, issues, opportunities and report on those findings to management |
Required |
3 |
Years |
Proficient in MS Office 2007 / 2010 proficient (Word, Excel, PowerPoint, Outlook) |
Required |
|
|
Strong technical knowledge of Windows and Unix environments |
Required |
|
|
Broad base of knowledge across the technology spectrum that include: networking protocols, security scanning products, anti-virus solutions, firewal |
Required |
3 |
Years |
Hands-on experience with network, system, and application vulnerability assessment and penetration testing |
Required |
3 |
Years |
Has direct demonstrable experience remediating or mitigating security weaknesses |
Required |
|
|
Knowledge of security audit tools, data logging tools, operating systems, and databases |
Required |
|
|
Has performed security audits, risk assessments, and/or analysis. Has experience with proposing recommendations for enhancing data systems security |
Required |
|
|
Security systems administration experience |
Required |
|
|
Security systems administration experience |
Desired |
|
|
Computing certification or designation |
Desired |
|
|
Security certification or designation |
Desired |
|
|
2 -4 year degree or with major in computing systems; or equivalent military or professional experience focused on computing systems |
Desired |
|
|