9 Vulnerability Analyst jobs in Kuwait
Vulnerability Analyst I
Posted 1 day ago
Job Viewed
Job Description
Join to apply for the Vulnerability Analyst I role at V2X Inc
3 days ago Be among the first 25 applicants
Join to apply for the Vulnerability Analyst I role at V2X Inc
Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems.
Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems.
Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks.
Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
- Conduct regular security assessments and audits of information systems with the DoD SWA network.
- Develop and implement action plans to manage common vulnerabilities and exposures.
- Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating.
- Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN.
- Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities.
- Recommend improvements to the overall cybersecurity posture.
- Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently.
- Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON.
- Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues.
- Additional requirements may vary depending upon location.
- Performs other duties and assignments as required.
- Qualifications
- Security Clearance:
- Requires an active Secret Clearance
- Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required.
- Bachelor’s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
- This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
- The authorized certifications for this job title are listed as follows:
- BASELINE:
- Cisco: CCNP: Certified Network Professional - Security
- CompTIA: CASP+ ce: Advanced Security Practitioner
- GIAC: GCED: Certified Enterprise Defender
- GIAC: GCIH: Certified Incident Handler
- ISACA: CISA: Certified Information Systems Auditor
- ISC2: CCSP: Certified Cloud Security Professional
- ISC2: CISSP (or Associate): Certified Information Systems Security Professional
- ISC2: CCSP: Certified Cloud Security Professional
- COMPUTING ENVIRONMENT (CE):
- Cisco: CCIE: Certified Internetwork Expert (Any)
- Cisco: CCNP: Certified Network Professional (Any)
- EC Council: CEH: Certified Ethical Hacker
- EC Council: ECIH: Certified Incident Handler
- EC-Council: CHFI: Certified Hacking Forensic Investigator
- EC-Council: CND: Certified Network Defender
- GIAC: GCIH: Certified Incident Handler
- Microsoft: 365 Certified: Enterprise Administrator Expert
- Microsoft: Certified: Azure Associate (Any)
- Microsoft: Certified: Azure Expert (Any)
- Microsoft: MCSE: (Any above 2012)
- Red Hat: RHCA: Certified Architect
- Red Hat: RHCE: Certified Engineer
- Red Hat: RHSA: Certified Systems Administrator
- Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience.
- Requires a minimum of seven (7) years of experience in telecommunications sector.
- Experience with a customer service-oriented company.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Business Development and Sales
- Industries Defense and Space Manufacturing
Referrals increase your chances of interviewing at V2X Inc by 2x
Sign in to set job alerts for “Analyst” roles. Assistant/Associate Professor- Accounting Logistics Operations Center (LOC) Analyst II (Supply) Cyber Recovery Solutions Senior Consultant Looking for Sales Specialist /Immigration ConsultantWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrVulnerability Analyst I
Posted 11 days ago
Job Viewed
Job Description
Join to apply for the Vulnerability Analyst I role at V2X Inc .
Get AI-powered advice on this job and more exclusive features.
OverviewWorking across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Our $3.9B company and 16,000 employees work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties encompass conducting comprehensive assessments of systems, networks, and applications to identify and mitigate security risks. You will analyze vulnerabilities, assess their impact, and collaborate with teams to implement remediation plans, ensuring data confidentiality, integrity, and availability.
This position involves planning, coordinating, scanning, analyzing, and reporting on compliance of the DoDIN to Cybersecurity Services customers at the regional and theater level. The role offers company-paid housing and transportation, a completion bonus, and tuition reimbursement. Candidates must meet all host country requirements to work legally.
Responsibilities- Conduct security assessments and audits of the DoD SWA network.
- Develop and implement action plans for vulnerabilities and exposures.
- Create report templates for daily use to maintain a minimum 95% vulnerability compliance rating.
- Monitor security alerts and bulletins to respond rapidly to cybersecurity incidents.
- Coordinate with cybersecurity teams to detect exploits of vulnerabilities.
- Recommend improvements to cybersecurity posture.
- Communicate effectively with management and military personnel to disseminate information timely.
- Support vulnerability management systems (Tenable, Nessus, ACAS, TYCHON).
- Prepare vulnerability scanning reports for commanders and higher headquarters.
- Perform additional duties as required.
- Active Secret Security Clearance.
- Bachelor’s Degree in Computer Science, MIS, IS, Engineering, or related field, or equivalent experience.
- Adherence to DoD 8570.01M, maintaining at least one baseline and one CE certification (e.g., CISSP, CCNP Security, CASP+).
- Minimum of 7 years of experience in telecommunications sector.
V2X is committed to equal employment opportunity, fostering an inclusive workplace that respects diversity and promotes fairness, dignity, and innovation.
Additional Details- Seniority level: Mid-Senior level
- Employment type: Full-time
- Job function: Business Development and Sales
- Industries: Defense and Space Manufacturing
Vulnerability Analyst I
Posted 11 days ago
Job Viewed
Job Description
Overview Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism. As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems. Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks. Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program! You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position. Responsibilities Conduct regular security assessments and audits of information systems with the DoD SWA network. Develop and implement action plans to manage common vulnerabilities and exposures. Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating. Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN. Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities. Recommend improvements to the overall cybersecurity posture. Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently. Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON. Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues. Additional requirements may vary depending upon location. Perform any additional duties as required/assigned. Qualifications Qualifications Security Clearance: Requires an active Secret Clearance Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required. Bachelor s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field. This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: IAT Level: IT II / IAT III BASELINE: Cisco: CCNP: Certified Network Professional - Security CompTIA: CASP+ ce: Advanced Security Practitioner GIAC: GCED: Certified Enterprise Defender GIAC: GCIH: Certified Incident Handler ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Certified Cloud Security Professional ISC2: CISSP (or Associate): Certified Information Systems Security Professional ISC2: CCSP: Certified Cloud Security Professional COMPUTING ENVIRONMENT (CE): Cisco: CCIE: Certified Internetwork Expert (Any) Cisco: CCNP: Certified Network Professional (Any) EC Council: CEH: Certified Ethical Hacker EC Council: ECIH: Certified Incident Handler EC-Council: CHFI: Certified Hacking Forensic Investigator EC-Council: CND: Certified Network Defender GIAC: GCIH: Certified Incident Handler Microsoft: 365 Certified: Enterprise Administrator Expert Microsoft: Certified: Azure Associate (Any) Microsoft: Certified: Azure Expert (Any) Microsoft: MCSE: (Any above 2012) Red Hat: RHCA: Certified Architect Red Hat: RHCE: Certified Engineer Red Hat: RHSA: Certified Systems Administrator Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience. Requires a minimum of seven (7) years of experience in telecommunications sector. We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity /Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/Female/Disabled/Veteran.
Company Industry
- Facilities Management
Department / Functional Area
- IT Software
Keywords
- Vulnerability Analyst I
Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at
People Looking for Vulnerability Analyst I Jobs also searched #J-18808-LjbffrVulnerability Analyst I
Posted 3 days ago
Job Viewed
Job Description
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems.
Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks.
Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
+ Conduct regular security assessments and audits of information systems with the DoD SWA network.
+ Develop and implement action plans to manage common vulnerabilities and exposures.
+ Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating.
+ Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN.
+ Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities.
+ Recommend improvements to the overall cybersecurity posture.
+ Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently.
+ Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON.
+ Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues.
+ Additional requirements may vary depending upon location.
+ Performs other duties and assignments as required.
Qualifications
+ Qualifications
+ Security Clearance:
+ Requires an active Secret Clearance
+ Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required.
+ Bachelor's Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
+ This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
+ The authorized certifications for this job title are listed as follows:
+ BASELINE:
+ Cisco: CCNP: Certified Network Professional - Security
+ CompTIA: CASP+ ce: Advanced Security Practitioner
+ GIAC: GCED: Certified Enterprise Defender
+ GIAC: GCIH: Certified Incident Handler
+ ISACA: CISA: Certified Information Systems Auditor
+ ISC2: CCSP: Certified Cloud Security Professional
+ ISC2: CISSP (or Associate): Certified Information Systems Security Professional
+ ISC2: CCSP: Certified Cloud Security Professional
+ COMPUTING ENVIRONMENT (CE):
+ Cisco: CCIE: Certified Internetwork Expert (Any)
+ Cisco: CCNP: Certified Network Professional (Any)
+ EC Council: CEH: Certified Ethical Hacker
+ EC Council: ECIH: Certified Incident Handler
+ EC-Council: CHFI: Certified Hacking Forensic Investigator
+ EC-Council: CND: Certified Network Defender
+ GIAC: GCIH: Certified Incident Handler
+ Microsoft: 365 Certified: Enterprise Administrator Expert
+ Microsoft: Certified: Azure Associate (Any)
+ Microsoft: Certified: Azure Expert (Any)
+ Microsoft: MCSE: (Any above 2012)
+ Red Hat: RHCA: Certified Architect
+ Red Hat: RHCE: Certified Engineer
+ Red Hat: RHSA: Certified Systems Administrator
+ Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience.
+ Requires a minimum of seven (7) years of experience in telecommunications sector.
+ Experience with a customer service-oriented company.
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.
Vulnerability Analyst I

Posted 15 days ago
Job Viewed
Job Description
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems.
Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks.
Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
+ Conduct regular security assessments and audits of information systems with the DoD SWA network.
+ Develop and implement action plans to manage common vulnerabilities and exposures.
+ Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating.
+ Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN.
+ Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities.
+ Recommend improvements to the overall cybersecurity posture.
+ Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently.
+ Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON.
+ Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues.
+ Additional requirements may vary depending upon location.
+ Perform any additional duties as required/assigned.
Qualifications
+ Qualifications
+ Security Clearance:
+ Requires an active Secret Clearance
+ Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required.
+ Bachelor's Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
+ This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
+ The authorized certifications for this job title are listed as follows:
+ IAT Level: IT II / IAT III
+ BASELINE:
+ Cisco: CCNP: Certified Network Professional - Security
+ CompTIA: CASP+ ce: Advanced Security Practitioner
+ GIAC: GCED: Certified Enterprise Defender
+ GIAC: GCIH: Certified Incident Handler
+ ISACA: CISA: Certified Information Systems Auditor
+ ISC2: CCSP: Certified Cloud Security Professional
+ ISC2: CISSP (or Associate): Certified Information Systems Security Professional
+ ISC2: CCSP: Certified Cloud Security Professional
+ COMPUTING ENVIRONMENT (CE):
+ Cisco: CCIE: Certified Internetwork Expert (Any)
+ Cisco: CCNP: Certified Network Professional (Any)
+ EC Council: CEH: Certified Ethical Hacker
+ EC Council: ECIH: Certified Incident Handler
+ EC-Council: CHFI: Certified Hacking Forensic Investigator
+ EC-Council: CND: Certified Network Defender
+ GIAC: GCIH: Certified Incident Handler
+ Microsoft: 365 Certified: Enterprise Administrator Expert
+ Microsoft: Certified: Azure Associate (Any)
+ Microsoft: Certified: Azure Expert (Any)
+ Microsoft: MCSE: (Any above 2012)
+ Red Hat: RHCA: Certified Architect
+ Red Hat: RHCE: Certified Engineer
+ Red Hat: RHSA: Certified Systems Administrator
+ Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience.
+ Requires a minimum of seven (7) years of experience in telecommunications sector.
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients.
Vulnerability Analyst I
Posted 1 day ago
Job Viewed
Job Description
Vulnerability Analyst I
role at
V2X Inc 3 days ago Be among the first 25 applicants Join to apply for the
Vulnerability Analyst I
role at
V2X Inc Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems. Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties would encompass a wide range of responsibilities aimed at ensuring the security and integrity of sensitive information and systems.
Vulnerability Analysts conduct comprehensive assessments of computing systems, networks, and applications to identify and mitigate potential security risks. While leveraging cybersecurity methodologies, analysts analyze vulnerabilities, assess their impact, and collaborate with cross-functional teams to implement effective remediation plans of action with milestones. Seeks to protect and defend information and information systems by ensuring data confidentiality and integrity with non-repudiation, authentication, and availability of data and technology through assessments of control frameworks.
Vulnerability Analysts strategically plan, coordinate, scan, analyze, and report compliance of the Department of Defense Information Network (DoDIN) to its Cybersecurity Services customers on the SWA regional and theater level. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
Conduct regular security assessments and audits of information systems with the DoD SWA network. Develop and implement action plans to manage common vulnerabilities and exposures. Design report templates for daily use and distribution to customers and subordinate personnel to maintain at minimum a 95% overall vulnerability compliancy rating. Monitor Information Assurance Security Alerts & Bulletins to detect and ensure rapid initial response to any cybersecurity related incident or event that could cause harm to the SWA AOR of the DoDIN. Maintain cross-communication with other cybersecurity division (e.g. IDS/IPS & ArcSight) to discover attempts to exploit known and zero-day vulnerabilities. Recommend improvements to the overall cybersecurity posture. Possess the ability to communicate effectively with management and upper echelon military personnel to ensure information is disseminated timely and efficiently. Maintain working knowledge of vulnerability management systems (Tenable & Nessus) Provides technical and operational support to functional end users of vulnerability tools (e.g. Assured Compliance Assessment Solution) ACAS and TYCHON. Prepares vulnerability scanning reports to submit to commanders and higher headquarters. Interfaces with the IAVM Manager and ISSO regarding vulnerability and remediation issues. Additional requirements may vary depending upon location. Performs other duties and assignments as required.
Qualifications
Qualifications Security Clearance: Requires an active Secret Clearance Education / Certifications: One-year related experience can be substituted for one year of education if the degree is required. Bachelor’s Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field. This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: BASELINE: Cisco: CCNP: Certified Network Professional - Security CompTIA: CASP+ ce: Advanced Security Practitioner GIAC: GCED: Certified Enterprise Defender GIAC: GCIH: Certified Incident Handler ISACA: CISA: Certified Information Systems Auditor ISC2: CCSP: Certified Cloud Security Professional ISC2: CISSP (or Associate): Certified Information Systems Security Professional ISC2: CCSP: Certified Cloud Security Professional COMPUTING ENVIRONMENT (CE): Cisco: CCIE: Certified Internetwork Expert (Any) Cisco: CCNP: Certified Network Professional (Any) EC Council: CEH: Certified Ethical Hacker EC Council: ECIH: Certified Incident Handler EC-Council: CHFI: Certified Hacking Forensic Investigator EC-Council: CND: Certified Network Defender GIAC: GCIH: Certified Incident Handler Microsoft: 365 Certified: Enterprise Administrator Expert Microsoft: Certified: Azure Associate (Any) Microsoft: Certified: Azure Expert (Any) Microsoft: MCSE: (Any above 2012) Red Hat: RHCA: Certified Architect Red Hat: RHCE: Certified Engineer Red Hat: RHSA: Certified Systems Administrator Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Software Engineering or Business Information Systems discipline for three years general experience. Requires a minimum of seven (7) years of experience in telecommunications sector. Experience with a customer service-oriented company.
At V2X, we are deeply committed to both equal employment opportunity, including protection for Veterans and individuals with disabilities, and fostering an inclusive and diverse workplace. We ensure all individuals are treated with fairness, respect, and dignity, recognizing the strength that comes from a workforce rich in diverse experiences, perspectives, and skills. This commitment, aligned with our core Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation, and expand our success in the global marketplace, ultimately enabling us to best serve our clients. Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Business Development and Sales Industries Defense and Space Manufacturing Referrals increase your chances of interviewing at V2X Inc by 2x Sign in to set job alerts for “Analyst” roles.
Assistant/Associate Professor- Accounting
Logistics Operations Center (LOC) Analyst II (Supply)
Cyber Recovery Solutions Senior Consultant
Looking for Sales Specialist /Immigration Consultant
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Vulnerability Analyst I
Posted 1 day ago
Job Viewed
Job Description
Vulnerability Analyst I
role at
V2X Inc . Get AI-powered advice on this job and more exclusive features. Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Our $3.9B company and 16,000 employees work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism. As a Vulnerability Analyst working on the Department of Defense (DoD) network, your duties encompass conducting comprehensive assessments of systems, networks, and applications to identify and mitigate security risks. You will analyze vulnerabilities, assess their impact, and collaborate with teams to implement remediation plans, ensuring data confidentiality, integrity, and availability. This position involves planning, coordinating, scanning, analyzing, and reporting on compliance of the DoDIN to Cybersecurity Services customers at the regional and theater level. The role offers company-paid housing and transportation, a completion bonus, and tuition reimbursement. Candidates must meet all host country requirements to work legally. Responsibilities
Conduct security assessments and audits of the DoD SWA network. Develop and implement action plans for vulnerabilities and exposures. Create report templates for daily use to maintain a minimum 95% vulnerability compliance rating. Monitor security alerts and bulletins to respond rapidly to cybersecurity incidents. Coordinate with cybersecurity teams to detect exploits of vulnerabilities. Recommend improvements to cybersecurity posture. Communicate effectively with management and military personnel to disseminate information timely. Support vulnerability management systems (Tenable, Nessus, ACAS, TYCHON). Prepare vulnerability scanning reports for commanders and higher headquarters. Perform additional duties as required. Qualifications
Active Secret Security Clearance. Bachelor’s Degree in Computer Science, MIS, IS, Engineering, or related field, or equivalent experience. Adherence to DoD 8570.01M, maintaining at least one baseline and one CE certification (e.g., CISSP, CCNP Security, CASP+). Minimum of 7 years of experience in telecommunications sector. V2X is committed to equal employment opportunity, fostering an inclusive workplace that respects diversity and promotes fairness, dignity, and innovation. Additional Details
Seniority level: Mid-Senior level Employment type: Full-time Job function: Business Development and Sales Industries: Defense and Space Manufacturing
#J-18808-Ljbffr
Be The First To Know
About the latest Vulnerability analyst Jobs in Kuwait !
Vulnerability Analyst I
Posted 4 days ago
Job Viewed
Job Description
Company Industry
Facilities Management
Department / Functional Area
IT Software
Keywords
Vulnerability Analyst I
Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at
People Looking for Vulnerability Analyst I Jobs also searched
#J-18808-Ljbffr
Security Analyst
Posted 2 days ago
Job Viewed
Job Description
Direct message the job poster from Bayt 22
Actively Managing Diverse Business VenturesJob Title: Part-Time Azure Security Administrator
Location: Flexible
About the Role:
We’re looking for a part-time Azure Security Administrator to help secure and manage our SaaS platform. In this role, you'll lay the groundwork for our security compliance, define the roadmap for our compliance initiatives, and ensure robust data security within our Azure environment.
Key Responsibilities:
- Manage and secure Azure environments for our SaaS platform.
- Oversee workload and data security management, ensuring best practices are followed.
- Lay the foundation for our security compliance efforts and define the roadmap for ongoing compliance initiatives.
- Seniority level Entry level
- Employment type Part-time
- Job function Information Technology
- Industries Information Services, Computer and Network Security, and IT Services and IT Consulting
Referrals increase your chances of interviewing at Bayt 22 by 2x
Sign in to set job alerts for “Security Analyst” roles. Service Desk Administrator (IT Help Desk) - Camp Buehring (Secret Clearance Required) Linux Cryptography and Security Engineer Mid-Level All Source Intelligence Analyst - OSINT FocusWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr