Senior Vulnerability Assessor (Senior Cyber Security Analyst) at Nevada National Security Sites (2024)

OverviewMission Support and Test Services, LLC (MSTS) manages and operates the Nevada National Security Site (NNSS) for the U.S. National Nuclear Security Administration (NNSA). Our MISSION is to help ensure the security of the United States and its allies by providing high-hazard experimentation and incident response capabilities through operations, engineering, education, field, and integration services and by acting as environmental stewards to the Site’s Cold War legacy. Our VISION is to be the user site of choice for large-scale, high-hazard, national security experimentation, with premier facilities and capabilities below ground, on the ground, and in the air. (See NNSS.gov for our unique capabilities.) Our 2,750+ professional, craft, and support employees are called upon to innovate, collaborate, and deliver on some of the more difficult nuclear security challenges facing the world today. In this environment, the best ideas need to be voiced and every opinion matters. As such, MSTS places great value on Diversity, Equity, and Inclusion and is committed to a diverse and equitable workforce, with an inclusive culture that values and celebrates the diversity of our people, talents, ideas, and perspectives.

  • MSTS offers our full-time employees highly competitive salaries and benefits packages including medical, dental, and vision; both a pension and a 401k; paid time off and 96 hours of paid holidays; relocation (if located more than 75 miles from work location); tuition assistance and reimbursem*nt; and more.
  • MSTS is a limited liability company consisting of Honeywell International Inc. (Honeywell), Jacobs Engineering Group Inc. (Jacobs), and HII Nuclear Inc.

ResponsibilitiesMSTS Cyber Security is seeking a Senior Vulnerability Analyst who possesses the knowledge, skills, and abilities required to conduct vulnerability scanning and remediation operations within an enterprise environment.

Key Responsibilities

  • Lead efforts in installation, configuration and execution of vulnerability and compliance assessments tools including Tenable products like Security Center, Nessus, Nessus Agents and other application assessment tools.
  • Leads team members in execution of vulnerability and compliance scans, perform assessments autonomously with little supervision.
  • Ensure scan results are accurate and coordinate authentication and scan failure issues with internal stakeholders.
  • Lead efforts to incorporate vulnerability scans in the OT environment.
  • Track software updates provided by the vendor and upgrade of all vulnerability assessment and compliance tools to ensure all systems managed by the team are secure.
  • Review and maintain the documentation including methods and procedures for each of the security boundaries and the scan infrastructure managed by the team.
  • Interact and coordinate with Cyber Security leadership to provide vulnerability status of security boundaries managed by the team.
  • Build and maintain dashboards that present actionable vulnerability data to IT teams and IT leadership in an intuitive manner.
  • Validate and test complex compliance audits and vulnerability plugins to ensure accuracy of the vulnerability scan results.
  • Communicate with the third-party vendors regarding issues with the scanning tools to ensure issues identified during the scanning process are troubleshooted and resolved.
  • Assist with data calls, FISMA reporting, compliance scanning and reporting, continuous monitoring and compiling reports for auditors.
  • Contribute to an overall productive and respectful work environment by providing excellent customer service and working in a positive, collegial manner at all times. Maintain cooperative and respectful working relationships with Cyber Security Staff, other divisions, and other customers.
  • Perform other duties assigned by Management.

Qualifications

  • Bachelor’s degree or equivalent training and experience in a computer-related field and at least 5 years of related experience.
  • Preferred additional qualifications
    • GIAC Enterprise Vulnerability Assessor (GEVA)
    • GIAC Security Essentials (GSEC)
    • Certified Information Systems Security Professional (CISSP)
  • Experience using MITRE ATT&CK framework.
  • Knowledge of vulnerability management and scanning best practices such as CVE database and the CVSS System used for scoring vulnerabilities.
  • Knowledge of network and application security principles such as OWASP Testing Guidelines, OWASP Application Security knowledge framework and ATT&CK framework.
  • Has command of a broad range of the most advanced Cyber Security principles, protocols, concepts and theories in a broad range of disciplines.
  • Ability to integrate work of specialized personnel to produce the desired results.
  • Knowledge of network-based services and client/server applications, familiarity with intrusion detection systems, familiarity with network architecture and security infrastructure placement.
  • Knowledge of Cyber Security vulnerabilities, mitigation strategies, network architecture, and how to apply security controls.
  • Ability to analyze network traffic, identify misconfigurations of information systems and networks, troubleshoot security appliances, independently identify network and host security vulnerabilities.
  • Understand the Windows operating system and command line tools, network protocols, and TCP/IP fundamentals.
  • Ability to maintain strict confidentiality.
  • Ability to communicate effectively in English, both verbally and in writing, sufficient to communicate with co-workers, customers, testify, write clear and concise reports, gather information, and collect information.
  • Ability to use multiple electronic devices including standard office machines, cellular phones, and security appliances.
  • Ability to articulate highly technical processes and information to a non-technical audience.
  • Ability to meet the physical requirements necessary to safely and effectively perform all assigned duties.
  • Ability to pass a federal background and obtain a “Q” Clearance.
  • The primary work location will be at the Losee Road facility in North Las Vegas, Nevada.
  • Work schedule will be 4/10s Monday through Thursday (subject to change).
  • Pre-placement physical examination, which includes a drug screen, is required. MSTS maintains a substance abuse policy that includes random drug testing.
  • Must possess a valid driver’s license.

MSTS is required by DOE directive to conduct a pre-employment drug test and background review that includes checks of personal references, credit, law enforcement records, and employment/education verifications. Applicants offered employment with MSTS are also subject to a federal background investigation to meet the requirements for access to classified information or matter if the duties of the position require a DOE security clearance. Substance abuse or illegal drug use, falsification of information, criminal activity, serious misconduct or other indicators of untrustworthiness can cause a clearance to be denied or terminated by DOE, resulting in the inability to perform the duties assigned and subsequent termination of employment. In addition, Applicants for employment must be able to obtain and maintain a DOE Q-level security clearance, which requires U.S. citizenship, at least 18 years of age. Reference DOE Order 472.2 , “Personnel Security”. If you hold more than one citizenship (i.e., of the U.S. and another country), your ability to obtain a security clearance may be impacted.

Department of Energy Q Clearance (position will be cleared to this level). Reviews and tests for the absence of any illegal drug as defined in 10 CFR Part 707.4 , “Workplace Substance Abuse Programs at DOE Sites,” will be conducted. Applicant selected will be subject to a Federal background investigation, required to participate in subsequent reinvestigations, and must meet the eligibility requirements for access to classified matter. Successful completion of a counterintelligence evaluation, which may include a counterintelligence-scope polygraph examination, may also be required. Reference 10 CFR Part 709 , “Counterintelligence Evaluation Program.”

MSTS is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status or other characteristics protected by law. MSTS is a background screening, drug-free workplace.

Annual salary range for this position is: $92,892.80 - $139,339.20.Starting salary is determined based on the position market value, the individual candidate education and experience and internal equity.

Senior Vulnerability Assessor (Senior Cyber Security Analyst) at Nevada National Security Sites (2024)

FAQs

How long does it take to become a senior cyber security analyst? ›

For most information security analysts, the career path takes 4-6 years. These professionals typically complete a four-year degree and build skills in cloud security, threat hunting, and threat intelligence. They may need several certifications, including CompTIA Security+.

What is the role of a senior vulnerability analyst? ›

Key Responsibilities:

Lead and manage technical projects with a focus on analytics and security. Serve as a Subject Matter Expert (SME) in web application scanning and device scanning. Utilize tools like Nessus, Security Center, Tenable.IO, and Qualys WAS for vulnerability management.

How much does an information security analyst earn in Nevada? ›

Cyber Security Analyst Salary in Las Vegas, NV
Annual SalaryHourly Wage
Top Earners$131,324$63
75th Percentile$110,300$53
Average$85,895$41
25th Percentile$75,900$36

What does a senior cyber security analyst do? ›

Provides lead technical instruction with cybersecurity hardware, software and services which may involve the use of distributed networks, local area networks, data transfer between operating systems, cloud services and other types of data networks and services.

Is 1 year enough to learn cyber security? ›

Cyber security concepts take about a year or two to understand fully. The study of cyber security takes longer than programming fields and cannot be completed in three months. The school path you choose and whether you have technical skills beforehand significantly impact how long it will take.

How many hours a day does a cyber security analyst work? ›

Most cyber security professionals spend roughly 40 hours a week in the office for full-time employment. However, during technology releases or program updates there are often longer hours required. Sometimes systems need updates or maintenance overnight, over weekends, etc.

What is the difference between vulnerability analyst and cybersecurity analyst? ›

However, the main difference between these two roles is that Security Analysts focus on implementing and maintaining an organization's security measures, while Vulnerability Management Engineers focus on identifying and mitigating security vulnerabilities.

What does a vulnerability assessor do? ›

This role performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. This role also measures effectiveness of defense-in-depth architecture against known vulnerabilities.

Is vulnerability management a good career? ›

Cyber threats are becoming more sophisticated and frequent, and as a result, the demand for cybersecurity professionals is increasing. Two popular career paths in the cybersecurity space are that of a Vulnerability management Engineer and an Information Security Engineer.

Do you need a degree to be a information security analyst? ›

Information security analysts typically need a bachelor's degree in computer and information technology or a related field, such as engineering or math. However, some workers enter the occupation with a high school diploma and relevant industry training and certifications.

How much does a cyber security analyst make in Reno Nevada? ›

As of Jul 28, 2024, the average annual pay for a Cyber Security Analyst in Reno is $93,012 a year.

How stressful is information security analyst? ›

Cybersecurity Analysts often operate in high-stakes environments where vigilance is paramount, as they protect sensitive data from ever-evolving threats. This responsibility can be stressful, necessitating continuous learning and adaptability.

Can a cyber security analyst work from home? ›

Like other jobs in computer & IT, cybersecurity jobs are well-suited for remote work.

What is the daily life of a cyber security analyst? ›

While the day-to-day tasks of a cybersecurity analyst will vary from company to company, here are a few tasks and responsibilities pulled from real job listings: Monitor network traffic for security incidents and events. Investigate incidents and respond to events in real time. Write detailed incident response reports.

Is cyber security analyst hard? ›

Many people hold the idea that cybersecurity is hard - hard to study, hard to become an expert in, and hard as a career. While cybersecurity does require highly technical skills, attention to detail, and excellent time management, the rewards for developing your skills in this field are well worth the effort.

How long does it take to make senior analyst? ›

Once they have at least 4-6 years of work experience, financial analysts can advance towards a senior financial analyst role. Senior financial analysts closely examine data, then use their findings to advise on investment decisions.

How to become senior cyber security? ›

Becoming a Senior Cyber Security Professional requires a combination of education, skills development, and practical experience. Volunteering for initiatives, CTF contests, and bug bounty programs, will also help to develop your experience.

How long does it take to become a SR data analyst? ›

Qualifications to Be a Senior Data Analyst

Three or more years of experience in data analytics or data science roles. Proven ability in using statistical analysis, predictive modeling and explanatory modeling to identify trends. Advanced understanding of data management and visualization practices.

How fast can I get a cyber security degree? ›

How Much Time Does It Take to Get a Degree in Cybersecurity? Bachelor's degrees commonly require 120-125 credits and take four years to complete. Advanced degrees, such as a master's in cybersecurity, typically require 30-36 credits and take two years to complete.

Top Articles
What Is The Role Of Vultures In The Ecosystem And Wildlife Conservation?
L-Lysine: Benefits, the Right Dosage, and Warnings
Pollen Count Los Altos
What Happened To Dr Ray On Dr Pol
oklahoma city for sale "new tulsa" - craigslist
Computer Repair Tryon North Carolina
Stolen Touches Neva Altaj Read Online Free
Rls Elizabeth Nj
World of White Sturgeon Caviar: Origins, Taste & Culinary Uses
Housing Intranet Unt
Pwc Transparency Report
Craigslist Malone New York
Colorado mayor, police respond to Trump's claims that Venezuelan gang is 'taking over'
Wisconsin Women's Volleyball Team Leaked Pictures
Extra Virgin Coconut Oil Walmart
Pay Boot Barn Credit Card
/Www.usps.com/International/Passports.htm
Https Paperlesspay Talx Com Boydgaming
What Channel Is Court Tv On Verizon Fios
Chase Bank Pensacola Fl
Japanese Mushrooms: 10 Popular Varieties and Simple Recipes - Japan Travel Guide MATCHA
Red Cedar Farms Goldendoodle
How To Tighten Lug Nuts Properly (Torque Specs) | TireGrades
WRMJ.COM
Bolly2Tolly Maari 2
Mcclendon's Near Me
Hannah Jewell
Bi State Schedule
Willys Pickup For Sale Craigslist
Syracuse Jr High Home Page
Audi Q3 | 2023 - 2024 | De Waal Autogroep
Tenant Vs. Occupant: Is There Really A Difference Between Them?
Ippa 番号
Henry County Illuminate
Blackwolf Run Pro Shop
2020 Can-Am DS 90 X Vs 2020 Honda TRX90X: By the Numbers
Tryst Houston Tx
Keir Starmer looks to Italy on how to stop migrant boats
Davis Fire Friday live updates: Community meeting set for 7 p.m. with Lombardo
Oppenheimer Showtimes Near B&B Theatres Liberty Cinema 12
Setx Sports
Emily Browning Fansite
Thor Majestic 23A Floor Plan
Foxxequeen
Pgecom
Best Suv In 2010
1990 cold case: Who killed Cheryl Henry and Andy Atkinson on Lovers Lane in west Houston?
Google Flights Missoula
Wild Fork Foods Login
Wieting Funeral Home '' Obituaries
Raley Scrubs - Midtown
7 National Titles Forum
Latest Posts
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 5397

Rating: 4.6 / 5 (46 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.