Leidos is a FORTUNE 500 company bringing a mix of innovative technology and sector expertise to customers in the national security, engineering, and the health industries. At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers’ success. We empower our teams, contribute to our communities, and operate sustainable. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business.
Your greatest work is ahead!
The Leidos Defense Group is hiring a Cybersecurity Specialist for Vulnerability Management & Remediation. The job location for this position is primarily at Joint Base Andrews (JBA); however, the successful candidate will complete and oversee tasks at Joint Base Anacostia-Bolling (JBAB) and the Pentagon as well.
If this sounds like the kind of environment where you can thrive, keep reading!
Leidos Defense Group provides a diverse portfolio of systems, solutions, and services covering land, sea, air, space, and cyberspace for customers worldwide. Solutions for Defense include enterprise and mission IT, large-scale intelligence systems, command and control, geospatial and data analytics, cybersecurity, logistics, training, and intelligence analysis and operations support. Our team is solving the world’s toughest security challenges for customers with “can’t fail” missions. To explore and learn more, click here!
Are you ready to make an impact? Begin your journey of a flourishing and meaningful career, share your resume with us today!
Remediating the “remaining” 5% of open vulnerabilities that are not patched by the automated patching solution using various strategies (e.g., scripting, manual patching, submitting tickets, quarantining, etc.)
Reviewing and validating DISA STIG compliance submissions from System Owners, ensuring all controls are configured and all checklists are updated appropriately
Investigating newly issued, unanalyzed vulnerabilities, and determining the risk to Department of Defense (DoD) Information Systems (IS) based upon prior knowledge and experience
Analyzing patch compliance and compliance reports from Combatant Commands, Service Cyber Components, Agencies, and Field Activities to determine risk and security posture of DoD IS
Developing mitigation orders for identified vulnerabilities, leveraging an in-depth understanding of vendor products and fix actions
Compiling daily, weekly, and annual vulnerability metrics for affected and unaffected DoD products
Reviewing System Owner remediation efforts, ensuring compliance or escalating noncompliance
Preparing formal reports and presentations to share findings and recommendations
Presenting vulnerability reports to cross-functional stakeholders, including Cybersecurity leadership
Tracking end-of-life software on DoD IS, addressing with removal or upgrades
Tracking and reporting vulnerability compliance in DoD/DoD component systems
Creating situational awareness products, providing DoD components with detailed information on vulnerabilities and appropriate mitigation strategies.
Tracking potential threats (e.g., vulnerabilities and exploits, worms, and viruses) and notifying customer/stakeholders.
Developing, documenting, & conveying Information Assurance Vulnerability Management (IAVM) operational requirements
Enhancing capabilities to identify, track, and remediate vulnerabilities, including efforts to develop a real-time patch management capability
Reviewing/approving Plans of Actions and Milestones (POA&Ms), Operational Impact Statements, and Information Assurance Vulnerability Alert (IAVA) compliance and managing/generating reports on the same
Required Experience, Skills, and Education:
Bachelor's degree in Information Security, Information Systems, or related discipline and 8+ years of direct experience; or master’s degree and 6+ years of experience. Additional relevant/specialized training and experience may be substituted in lieu of degree.
Current, DoD 8570-compliant certification for IAT Level II (e.g., Security + w/CE) prior to start.
Active DoD Secret clearance or higher.
Hands-on experience conducting vulnerability assessment and analysis utilizing SCAP, ACAS/NESSUS, and DISA STIGs
Experience interpreting security advisories - leveraging diverse sources to gain a technical understanding of a vulnerability, exploitation, and its potential impact.
Experience troubleshooting Microsoft Endpoint Configuration Manager (MECM)
Experience with direct customers interactions to handle service inquiries and problems
Experience with server patch management methodologies
Experience with Scripting/Automation using PowerShell and shell script language
Ability to troubleshoot and fix existing PowerShell and shell scripts
Technical experience discovering, validating, and remediating network vulnerabilities
Experience mentoring junior personnel
Proven time management skills
Strong oral and written communications skills
History of working effectively on a team - supporting peers to improve processes and delivering results
Experience with Enterprise IT Service Management systems (e.g., Remedy)
Preferred Experience, Skills, and Education:
Experience with HBSS, Tanium, and MECM
Active Secret clearance with the ability to obtain a TS/SCI
Pay Range:Pay Range $94,250.00 - $145,000.00 - $195,750.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Leidos is a Fortune 500® technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, civil, and health markets. The company’s 46,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $14.4 billion for the fiscal year ended December 30, 2022. For more information, visit www.Leidos.com.
Pay and Benefits
Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.
Securing Your Data
Beware of fake employment opportunities using Leidos’ name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system – never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at [email protected].
If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.
Commitment to Diversity
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.