Job ID: TX-70126090 (917490430)
Remote Security Analyst (15+) with Vulnerability Inventory/Baseline/Management, Remediation Coordination, Risk Classification/Prioritization, scanning, NIST experience
Location: Austin, TX (TEA)
Duration: 3 Months
Skills:
8 Required Experience in Vulnerability Inventory and Baseline Establishment
8 Required Experience in Risk Classification and Prioritization
8 Required Experience in tracking vulnerability remediation
8 Required Experience in producing status reports
8 Required Experience in validating remediation actions through available evidence, including vulnerability scan results
Vulnerability Inventory and Baseline Establishment
1. Review the Agency’s existing vulnerability data, including vulnerabilities identified through scanning, assessments, or other security tools.
2. Establish and maintain a consolidated vulnerability baseline.
3. Develop and document a remediation timeline for all identified vulnerabilities, reflecting current risk posture and aging.
Risk Classification and Prioritization
1. Ensure that vulnerabilities are categorized and prioritized based on risk, severity, exploitability, and potential impact to Agency operations.
2. Align vulnerability classification and prioritization to applicable NIST guidance.
3. Validate that remediation timeframes align with Agency established expectations for different vulnerability risk levels.
Remediation Coordination and Communication
1. Coordinate remediation activities with system, server, and application owners.
2. Communicate clear remediation expectations, risk context, and required timelines to responsible parties.
3. Track remediation progress and identify blockers, dependencies, or delays impacting closure.
4. Escalate overdue, high risk, or critical vulnerabilities to appropriate Agency governance or oversight bodies, in accordance with Agency processes.
Tracking, Metrics, and Reporting
1. Maintain ongoing tracking of vulnerability remediation status.
2. Produce periodic status reports summarizing.
Validation and Closure
1. Validate remediation actions through available evidence, including vulnerability scan results or other supporting artifacts.
2. Confirm closure of vulnerabilities in tracking systems once remediation is completed and validated.
3. Ensure vulnerabilities that cannot be remediated within required timeframes are formally documented and supported by approved risk acceptance or exception documentation, in accordance with Agency policy.
Program Improvement Support
1. Identify process gaps, systemic issues, or control weaknesses affecting vulnerability remediation effectiveness.
2. Provide recommendations for improving vulnerability remediation processes and accountability, aligned with NIST standards and Agency governance requirements.
