HYBRID Network Vulnerability Analyst with Security Clearance - San Diego, CA, United States - Zachary Piper Solutions, LLC

    Default job background
    Technology / Internet
    Description
    Zachary Piper Solutions is seeking a Network Vulnerability Analyst for a position supporting a government contracting firm.

    The Network Vulnerability Analyst will be required to work on-site one day per week in Point Loma San Diego, CA.

    Theanalyst will identify, assess, and mitigate security vulnerabilities in network systems through scanning, testing, and updating security measures. *This position requires an Active Secret Clearance
    • Responsibilities of the

    Network Vulnerability Analyst:

    • Conduct penetration tests on diverse applications utilizing tools supplied by the client.
    • Validate the susceptibility of networks to new exploits through proof-of-concept development.
    • Maintain the reliability and functionality of signature-based scanning systems.
    • Create and refine Standard Operating Procedures as well as Proofs of Concept documentation.
    • Assist in the preparation and execution of Command Cyber Readiness Inspections.
    Necessary Qualifications for the

    Network Vulnerability Analyst:

    • Proficiency in Linux fundamentals and ACAS suite lifecycle management.
    • Skilled in vulnerability identification and remediation processes.
    • Familiarity with DoD STIGs for secure systems operations.
    • Experience with scripting in PowerShell, BASH, or Python.
    • Competence in managing and configuring virtual environments such as vSphere, VirtualBox, KVM, and QEMU.
    • Strong client-facing communication skills.
    Compensation for the

    Network Vulnerability Analyst:

    Salary:
    $115k


    Full Standard Benefits:

    Paid Time Off, Paid Holidays, Healthcare (Medical, Dental, Vision), Retirement Savings Plan (401K), and more Keywords: Active Secret Clearance, Network Vulnerability Analyst, Zachary Piper Solutions, Government Contracting, Cybersecurity Roles, San Diego Cybersecurity, On-site Cyber Analyst, Point Loma Jobs, Defense Cybersecurity, Penetration Testing Expert, Network Security Assessment, Vulnerability Scanning, ACAS Proficiency, Linux Security, Cyber Threat Mitigation, Security Measure Implementation, Vulnerability Remediation Strategies, Proof of Concept Testing, Signature Scanning Tools, Standard Operating Procedures, SOP Documentation, Cyber Readiness Inspection, Command Cyber Readiness, Department of Defense Compliance, DoD Security Technical Implementation Guides, STIG Implementation, Scripting Skills, PowerShell Scripting, BASH Scripting, Python Scripting, Virtual Machine Configuration, vSphere Expertise, VirtualBox Knowledge, KVM Management, QEMU Usage, Technical Communication, Cybersecurity Solutions, Security Analyst, Information Systems Security, Network Defense Analyst, Cyber Risk Management, Threat Intelligence Analysis, System Hardening, Cyber Operations Planner, Secure Network Design, IT Security Best Practices, Information Security Analyst, Cybersecurity Engineering, Cyber Defense Mechanisms, Security Architecture, Network Infrastructure Protection, Security Clearance Jobs, Top Secret Clearance, Classified Network Security, Military Cyber Operations, Government IT Security, Security Protocol Development, Cybersecurity Compliance, Information Assurance Policies, Cyber Threat Analysis, Secure Configuration Management, Advanced Cybersecurity Techniques, Cybersecurity Innovation, Network Resilience, Cyber Attack Prevention, Tactical Cyber Defense, Strategic Security Planning, Cybersecurity Awareness, Security Audit Support, Cyber Incident Response, Cybersecurity Training, Network Security Solutions, Critical Infrastructure Security, Cybersecurity Policy, Secure Communications, Intrusion Detection Systems, Cybersecurity Regulations, Ethical Hacking, Cybersecurity Research, Security Patch Management, Vulnerability Disclosure, Information Security Governance, Cybersecurity Risk Assessment, Cybersecurity Monitoring, Network Security Architecture, Cybersecurity Strategy, Cybersecurity Advisory, Network Encryption, Data Protection, Cybersecurity Forensics, Advanced Persistent Threat Defense, Cybersecurity Framework Implementation.