More jobs:
Product Support Manager Security Clearance
Job in
San Antonio, Bexar County, Texas, 78202, USA
Listed on 2026-01-05
Listing for:
BEAT LLC
Full Time
position Listed on 2026-01-05
Job specializations:
-
IT/Tech
Cybersecurity, Information Security
Job Description & How to Apply Below
Job Title:
Product Support Manager - Intermediate(Vulnerability Assessment Analyst)
Location:
San Antonio, TX
Education:
- BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or Military Training or Approved DoD 8140 cyber-related certification Certification: GLCS, CISSP Position
Description:
The Information Assurance (IA) Security Administrator – Vulnerability Assessment Analyst supports the DHA Domain and Directory Services Branch (DDSB) by performing continuous monitoring, vulnerability assessments, and remediation validation to protect enterprise IT systems. This role ensures compliance with the DoD Risk Management Framework (RMF), DHA security directives, and enterprise cybersecurity standards. The IA Security Vulnerability Assessment Analyst plays a vital role in reducing cyber risk across the DHA enterprise.
By identifying vulnerabilities, validating remediations, and ensuring compliance with RMF and DoD directives, this role strengthens DHA’s cybersecurity posture and helps protect mission-critical healthcare IT systems across the Military Health System. Conduct credentialed vulnerability scans using ACAS, Nessus, and related tools, ensuring complete coverage of enterprise servers, endpoints, and applications. Identify, analyze, and report security vulnerabilities and misconfigurations, providing risk-based recommendations to system administrators and security teams.
Maintain accurate and up-to-date asset inventories in ACAS and eMASS, ensuring all systems are continuously scanned and tracked. Develop and update Plan of Action and Milestones (POA&Ms) for vulnerabilities that cannot be immediately remediated, tracking progress and verifying closure. Provide weekly and ad-hoc vulnerability reports in compliance with DHA reporting schedules and DoD cybersecurity requirements.
· Collaborate with Control Assessors, Systems Administrators, and engineering teams to integrate vulnerability assessment results into risk assessments, change management processes, and accreditation packages. Support incident response activities by identifying exploited vulnerabilities and documenting corrective actions. Develops: o Weekly and on-demand vulnerability scan reports;
Updated asset and compliance reports in ACAS/eMASS; POA&Ms documenting mitigation strategies and remediation progress o Security risk assessment documentation and validation artifacts;
Vulnerability-related incident and corrective action reports
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×