ACAS Vulnerability and Scanning Analyst: Senior

North Charleston, South Carolina, United States

Full Time
Spinvi logo
Apply now Apply later

Posted 1 month ago

Position Description: The successful candidate will join the Vulnerability Analysis and Assessment Team (VAAT) onsite at NIWC in Charleston, S.C., participating in activities associated with vulnerability scanning, vulnerability analysis, scan analysis/troubleshooting in support of the DoD Information Assurance Vulnerability Management (IAVM) program and JFHQ-DoDIN directives protecting the DHA MHSi military health records. The candidate will primarily be responsible for infrastructure support and management of the Assured

Compliance Assessment Solution (ACAS), analyzing vulnerability scanning activities and tracking/reporting on vulnerabilities to include Plan of Actions and Milestones (POA&M) submittals as required. Attention to detail is necessary in order for the candidate to be successful and progress in this role.

Qualifications/ Education:

  • 5 Years of experience using ACAS or VS tool, 4-year college degree in a computer science related field or 7 years’ experience


  • DoDD 8140 CSSP Auditor


Required Clearance:

  • T5/SSBI Investigation

Required Skills:

  • Must meet requirements of DoD Directives 8570.01M
  • Must be proficient with desktop programs such as Adobe Acrobat, MS Excel, MS Word
  • Must possess a high attention to detail

Highly Desired Skills:

  • Past experience managing an ACAS infrastructure is a plus
  • Prior experience working within a large ACAS deployment

Position Requirements and Duties:

  • Managing and sustaining ACAS objects
  • Creating and updating site and POR repositories to include STIG, Supported, Unsupported, Site/POR and Fragile repositories based on email sent by Program Support and the supporting documentation on the share drive
  • Creating and updating appropriate asset lists based on updated user RFIs
  • Creating and updating scan zones based on SNAP directives and IP plan notifications from Program Support
  • Adding and pushing plugins to Nessus scanners based on notifications from the NSOC Linux administrators
  • Associating Nessus scanners to appropriate scan zones
  • Creating ACAS user accounts
  • Determining appropriate group associations by working with Program Support and subscribers
  • Updating and resetting passwords as needed
  • Revalidating user accounts as directed by Program Support
  • Assisting ACAS users with credentialed scan issues
  • Reviewing/submitting POA&Ms for past due Information Assurance Vulnerability Alerts/Bulletins
  • Reviewing and providing recommendations for mitigation strategy implementations for proper safeguards
  • Reviewing for formatting issues, spelling and IAVM information accuracy
  • Analyzing vulnerability scan results and subsequent reporting using the ACAS application
  • Managing, disseminating, interpreting and tracking compliance with IAVM’s
  • Providing TASKORD compliance data to Communications Officer
  • Maintaining existing standard operational procedure (SOP) documentation and drafting new SOPs and other documentation as necessary
  • Assisting subscribers by troubleshooting ACAS application functionality and infrastructure
  • Authentication issues, login issues, invalid permissions, inaccurate group associations, and scan zone issues
  • Uploading and maintaining DISA SCAP content
  • SCAP content uploaded monthly and by user request
  • Sending ASR/ARF reports to users as requested
  • Sending .nessus files as requested
  • Monitoring VAAT inbox
  • Monitoring and assisting with tickets submitted in the VAAT Remedy queue
  • Conducting vulnerability scans and providing reports for assigned PORs
  • Performing routine and ad-hoc scans using the ACAS application
  • Uploading subscriber reports to KBS
  • Attending and participating on monthly subscriber compliance calls conducted by Program Support
  • Monitoring the health of the Security Centers and associated scanners
  • Initiating SSH connections into Nessus scanners for troubleshooting purposes
  • Notifying Linux administrators of outages
  • Providing subscriber issuance compliance metrics to the Cyber Operation Center (CyOC)
  • Completing the VAAT portion of the SOVT process by initiating SSH connection into the Nessus scanner for connectivity verification

Additional Information:

  • Authorized to view audit records on Central Log Server
Job tags: C Clearance DoDD 8140 Linux Military Strategy Vulnerabilities Vulnerability management