×
Register Here to Apply for Jobs or Post Jobs. X

Vulnerability Analyst

Job in Lemont, DuPage County, Illinois, 60439, USA
Listing for: Delan Associates, Inc
Full Time position
Listed on 2026-01-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below
Location: Lemont

Overview

Title:
Cyber Risk Analyst

W-2 Only (no 1099)

Must be a U.S. Citizen

Company's

Location:

Lemont, IL

Job Description

Background: Companys Cyber Security Program Office (CSPO) promotes the safe and secure use of technology. The CSPO serves Company by providing a variety of cybersecurity services including consultation, protection technologies, detection technologies, cybersecurity education and awareness, cybersecurity incident management, vulnerability management, compliance, and cybersecurity risk management.

The Cyber Security Program Office is seeking a full-time Vulnerability Analyst.

Contract Position:
Full Time, 40 hour work week

Period of Performance: 1 Year

Scope

This is an opportunity for a Vulnerability Analyst within the Cyber Security Program Office (CSPO). The Vulnerability Analyst will play an important role to identify, assess, prioritize, report, and assist others in mitigating vulnerabilities within an organization s information systems. This engagement will free up other cybersecurity resources to work in other critical Company areas.

  • Possess a working level expertise with the National Institute of Standards and Technologies (NIST) Cybersecurity Framework (CSF) and the NIST 800-53 series of control families and approaches.
  • Using automated tools and manual techniques to client security weaknesses (i.e. Tenable Security Center, Nucleus Security, etc...)
  • Conducting regular scans and assessments of systems, applications, and networks to identify potential vulnerabilities.
  • Analyzing the identified vulnerabilities to determine their potential impact on the organization.
  • Prioritizing vulnerabilities based on their severity and the risk they pose to the organization.
  • Performing routine assignment of tickets to IT and other teams to address vulnerabilities as part of a  cyber hygiene  process.
  • Recommending mitigation strategies to address identified vulnerabilities.
  • Working with IT and development teams to apply patches, configure systems securely, and implement other remediation measures. This position is not expected to perform patching activities.
  • Creating detailed reports on the findings of vulnerability assessments and risk analyses.
  • Documenting the status of vulnerabilities and the actions taken to mitigate them.
  • Communicating the results of vulnerability assessments, risk analyses, and other cyber hygiene work to stakeholders, including management and technical teams.
  • Staying up to date with the latest cybersecurity threats, vulnerabilities, and best practices.
  • Continuously improving the organization s vulnerability management processes and tools.
  • Attend online/Teams meetings with team and others as appropriate
  • Work with team to provide status on current task, suggest improvements, discuss implementation, etc.
Objectives

The ideal candidate will support the projects and tasks associated with Vulnerability Management Program

Technical Direction of Work

Report to the Lead Cybersecurity Engineer within the Cyber Security Program Office (CSPO); including daily guidance and collaboration with others in the Cyber Security Program Office (CSPO).

Task and Time Reporting

The project managers measure work performed by the contractor on a task basis. The tasks typically represent 8 to 80 hours of effort with performance being measured at the completion of each of the assigned tasks. Hours will be recorded on a weekly time sheet; progress against planned tasks will be reported weekly.

Typically, the work is performed remotely. For the candidate within driving distance of the Lab, there may be rare times to be onsite for in-person meetings, assessments, or presentations. Most of the Business Information Services (BIS) Division works remotely and are rarely onsite. If the candidate is out of state, too far away from the Lab, onsite meetings are not feasible to attend and not required.

Management

and Remediation Plan
  • Collaborate with IT and system administrators to create a patch management policy.
  • Provide a prioritization of vulnerabilities for remediation based on risk assessment.
  • Run  Hygiene Improvement Process? (HIP) vulnerability tasks (e.g., generating prioritized list of systems or vulnerabilities to remediate, creating and assigning tickets, follow-up on tickets, enforcing mitigation requirements, reporting).
  • Develop a schedule, aligned with existing policy, for applying patches and updates to systems and applications.
  • Monitor the effectiveness of patching efforts and adjust the plan as needed.
  • Provide bi-weekly, monthly, and quarterly reports of vulnerability and patching efforts to various stakeholders.
Cloud, Container, and Dev Sec Ops
  • Cloud posture and vulnerabilities:
    • Implement CSPM/agent-based scanning for IaaS/PaaS; cover images, VMs, serverless, and managed services.
    • Ensure tagging/ownership standards in cloud for routing remediation.
  • Containers and Images:
    • Scan images in registries and at build time; block critical vulns from promotion.
  • Application Dependencies:
    • Introduce SCA for third-party libraries; integrate…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary