Vulnerability Manager II
Job in
San Antonio, Bexar County, Texas, 78208, USA
Listed on 2025-12-19
Listing for:
Beyond SOF
Full Time
position Listed on 2025-12-19
Job specializations:
-
IT/Tech
Cybersecurity, IT Consultant, Information Security, Systems Analyst
Job Description & How to Apply Below
Essential Job Functions
- Knowledge ofcyber threats and vulnerabilities.
- Determine overall Common Vulnerabilities and Exposures (CVE) priority when threat activity is identified; report incidents that may cause immediate and/or ongoing impact to the environment.
- Monitor and provide periodic system owners vulnerability mitigation completion updates.(U) Knowledge of system and application security threats, vulnerabilities, and cyber attackers.
- Monitor external data sources to determine which security issues may have an impact on the enterprise.
- Identify, develop, and determine mitigation or remediation actions for system and network vulnerabilities.
- Communicate written and verbal information in a timely, clear, and concise manner.
- VuApplycybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
- Knowledge of system administration, network, operating system hardening techniques, and the risk management process.
- Knowledge of specific operational impacts of cybersecurity lapses and organization's threat environment.
- Recommend impact/risk assessments to identify systemic security issues based on the analysis of vulnerability and configuration data.
- Document and elevate incidents (including event’s history, status, and potential impact for further action); recommend mitigations that will have immediate impact to the environment.(U) Perform after-action reviews of team products to ensure completion of analysis.
- Lead and mentor team members as a technical expert.
- Due to the nature of this position and the information that employees will be required to access; U.S. Citizenship is required.
- Active Top Secret Security Clearance with Full Scope polygraph is required.
- Four (4) years of demonstrated experience as a VM in programs and contracts of similar scope, type, and complexity is required.
- Two (2) years of experience of technical reporting.
- Two (2) years of experience in network and threat analysis.
- A technical bachelor’s degree from an accredited college or university may be substituted for two (2) years of VM experience on projects of similar scope, type, and complexity.
- Multiple Shifts available.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×