Short Description:
Responsible for the administration, documentation, maintenance and issue resolution of vulnerability scanning solution.
Complete Description:
The candidate must work with State agencies and other government entities to implement and administer nCircle's continuous vulnerability management solution and related components. They must prepare and present reports, results and recommendations to management. They will be responsible for setting up the vulnerability scan networks and schedules.
Candidate must be:
• Self-managed and able to work well independently with minimal direction / supervision
• Be able to work independently and within a team environment
• Self-motivated – self-starter who is goal and detail oriented, and who is results driven
• Manage expectations
• Possess excellent interpersonal communication skills (oral and written)
• Rapidly adjust perspective between macro and micro view of project, deliverables, and people
• Readily adapt to change and setbacks.
• Expected to complete assignments timely and submit weekly status reports indicating progress on assigned tasks, performance against assigned project due dates, and identification and suggested resolution for issues having the potential to adversely impact the project.
• Be able to start within 30 days of offer
Skills:
Skill
Required / Desired
Amount
of Experience
2 -4 year degree or with major in computing systems; or equivalent military or professional experience focused on computing syste
Required
5
Years
Enterprise IT infrastructure administration – i.e. server administration, network administration, storage systems administration, directory management
Required
3
Years
Experience working with networks and writing network notation – demonstrable knowledge of TCP/IP networks
Required
3
Years
Experience analyzing test results or reports to identify trends, issues, opportunities and report on those findings to management
Required
3
Years
Proficient in MS Office 2007 / 2010 proficient (Word, Excel, PowerPoint, Outlook)
Required
Strong technical knowledge of Windows and Unix environments
Required
Broad base of knowledge across the technology spectrum that include: networking protocols, security scanning products, anti-virus solutions
Required
Security systems administration experience
Desired
Hands-on experience with network, system, and application vulnerability assessment and penetration testing
Desired
Knowledge of security audit tools, data logging tools, operating systems, and databases
Desired
Security systems administration experience
Desired
Computing certification or designation
Nice to have
Security certification or designation
Nice to have