The Challenge:
Warnings about cyber threats are everywhere and the constantly evolving nature of these threats can make understanding them to seem overwhelming to government agencies. In all of this “cyber noise”, how can these organizations understand their risks and how to mitigate them? The answer is you – an information security risk specialist who will break down complex threats into manageable plans of action.
As an information security risk specialist on our team, you’ll use your experience to work with civilian regulatory government agencies to discover their cyber risks, understand applicable policies, and develop a mitigation plan. You’ll review technical, environmental, and personnel details from SMEs and engineers to assess the entire threat landscape. Then, you’ll guide your client through a plan of action with presentations, white papers, and milestones. You’ll work with your client to translate security concepts, so they can make the best decisions to secure their critical infrastructure and mission critical systems. This is your opportunity to act as an information security subject matter expert while broadening your skills in developing and maintaining security tools in an enterprise environment. Join us as we protect our nation’s cyber infrastructure.
Empower change with us.
You Have:
- Experience with maintaining, optimizing, and troubleshooting the Tenable solution currently deployed in a UNIX environment, including Tenable.sc, Tenable.io, NNM, LCE, Nessus Manager, Agents, and Scanner
- Experience with deploying, configuring, and maintaining Nessus agents in an enterprise environment, including the application of best practices for schedules and integration with Tenable.sc
- Experience with supporting upgrades of Tenable.sc, Nessus Manager, Nessus scanners, LCE, and PVS
- Experience with performing security compliance and vulnerability assessments specifically developing and applying STIG or CIS baselines for various operating systems, including Windows or RHEL and CentOS
- Experience with configuring authentication methods, including PIV, SAML and LDAP, and development of role-based access controls (RBAC)
- Experience with performing enterprise-wide networking scanning, agent scan, container, including a credential scan of UNIX, Windows, Network devices, and VMware
- Ability to provide design and architectural guidance for tool capabilities during technical stakeholder meetings
- Ability to prepare and maintain solution documentation, including security, configuration, and CONOPS
- Ability to obtain a security clearance
- BA or BS degree
Nice If You Have:
- Experience with using Tenable APIs, integrating tenable products and automating daily activities
- Experience with creating dynamic asset, dashboards, and reports
- Experience with administering Windows and UNIX in an enterprise environment
- Experience with using security tools and technologies, including Domain Naming Service (DNS), Active Directory (AD), Windows PowerShell, Windows credential stores, Microsoft Certificate Authority, Python, REST, JSON, SOAP, Shell Scripting, TCP stack, and Wireshark
- SANS GIAC or CISSP Certification
Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information.
Build Your Career:
Rewarding work, fun challenges, and a ton of investment in our people—that’s Booz Allen cyber. When you join Booz Allen, we’ll help you develop the career you want.
- Competitions — From programming competitions at our PyNights (Python competition and learning events) to competing in CTFs, we’ve got plenty of chances for you to show off your skills.
- Paid Research — Have an innovative idea to explore or hypothesis to test? You can participate in challenges via our crowdsourcing platform, the Garage, and other programs to be awarded dedicated time and funding to advance your skills.
- Cyber University — CyberU has more than 5000 instructor-led and self-paced cyber courses, a free online library that you can access from just about anywhere—including your phone—and certification exam prep guides that include practical assessments to prepare you for your exam.
- Academic Partnerships — In addition to our tuition reimbursement benefit, we’ve partnered with University of Maryland University College to offer two graduate certificate programs in cybersecurity—fully funded without a tuition cap.
- Maker/Hackerspaces — Race drones, print 3D gadgets, drink coffee from our Wi-Fi coffee maker, and get hands-on training on tools and tech from in-house experts in our dedicated maker and hackerspaces.
We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.
#LI-AH1, ID15-C