Cybersecurity Vulnerability Analyst / Incident Manager

Arlington, Virginia, United States

Applications have closed


Market leader in Digital Transformation & Automation using Artificial Intelligence and Machine Learning

View company page

Cybersecurity Vulnerability Analyst / Incident Manager

Location: Arlington, VA

Must have an active Top Secret Clearance

Node is supporting a U.S. Government customer to provide cybersecurity vulnerability analysis support to reduce the prevalence and impact of vulnerabilities and exploitable conditions across Federal Civilian Executive Branch (FCEB) entities and Critical Infrastructure Key Resources (CIKR).

The Cybersecurity Vulnerability Analyst utilizes cybersecurity best practices, risk management techniques, critical thinking, and strong analytical skills to analyze information from multiple sources, synthesize that information, and provide expert analysis to senior customer stakeholders.

Node is seeking a Cybersecurity Vulnerability Analyst to support this critical customer mission.


  • Utilize creativity and divergent thinking to assess and explain the impact of cybersecurity vulnerabilities on FCEB and CIKR security postures
  • Conduct prevalence and sector analysis of vulnerabilities with Attack Surface Management tools
  • Review vulnerability reporting to identify potential risks and impacts CIKR and FCEB entities
  • Maintain awareness of technical capabilities of Vulnerability Management (VM) Subdivision operational components
  • Evaluate technical requirements of VM operational components and recommend paths forward
  • Understand and articulate the impact of vulnerabilities on organizations
  • Coordinate with VM analysts and leadership to synchronize VM operational activities
  • Coordinate with broader Cybersecurity Division (CSD) analysts and leadership to understand CSD operational priorities and activities
  • Willingness, ability, and flexibility to assist the government to standup this new mission operations area within VM
  • Demonstrated ability to contribute to developing Standard Operating Procedures and Work Instructions as required
  • Demonstrated ability to contribute to weekly operation summaries, intelligence analysis summaries, and other cyber intelligence reports

  • Requirements

    Required Skills:

  • U.S. Citizenship
  • Must have an active TS/SCI clearance
  • Must be able to obtain DHS Suitability
  • 5+ years of directly relevant experience
  • Experience as a hands-on cybersecurity analyst (i.e. SOC Analyst or Penetration Tester) is required
  • Experience with the analysis and characterization of cyber attacks
  • Skilled in identifying different classes of attacks and attack stages
  • Knowledge of system and application security threats and vulnerabilities
  • Knowledge of basic networking protocols, including TCP/IP, UDP, HTTP/HTTPS, SSH, and DNS, and open security standards and projects, including OWASP
  • Knowledge of CVSS and KEV scoring methodology
  • Knowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.)
  • Knowledge of VM scanning, Web Application scanning, and red team processes
  • Experience recognizing and categorizing types of vulnerabilities and associated attacks
  • Knowledge of Computer Network Defense policies, procedures, and regulations
  • Knowledge of different operational threat environments (e.g., first-generation [script kiddies], second-generation [non-nation-state sponsored], and third-generation [nation-state sponsored])
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code)
  • Experience in developing and delivering technical briefings
  • Must be able to work collaboratively across physical and virtual locations
  • Desired Skills:

  • Understanding of OT/ICS/SCADA technologies and associated vulnerabilities
  • Experience with conducting all-source research
  • Understanding of MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK)
  • Experience with:
  • o SharePoint

    o ServiceNow

    o Palo Alto Networks Cortex Xpanse

    Required Experience Education:

    BS in Computer Science, Computer Engineering, Computer Information Systems, Cybersecurity, or related degree, or 7+ years experience in cyber incident management experience or cybersecurity experience with a High school diploma.

    Desired Certifications:

  • Company Overview:

    Node Digital is an independent Digital Automation & Cognitive Engineering company that integrates best-of-breed technologies to accelerate business impact.

    Our Core Values help us in our mission. They include:


    Identifying the~RIGHT PEOPLE~and developing them to their full capabilities

    Our customer’s “Mission” is our “Mission”. Our~MISSION FIRST~approach is designed to keep our customers fully engaged while becoming their trusted partner

    We believe in~SIMPLIFYING~complex problems with a relentless focus on agile delivery excellence

    Our mantra is “~Simple*Secure*Speed~” in the delivery of innovative services and solutions


    • Medical (100% Coverage for Employee)
    • Dental
    • Vision
    • Basic Life (100% Coverage for Employee)
    • Health Saving Account
    • 401K
    • Three weeks of PTO
    • 10 Paid Holidays
    • Pre-Approved Online Training

    * Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

    Tags: Agile Application security Automation CCSP CEH CIPP CISA CISM CISSP Clearance CompTIA Computer Science CVSS DNS ICS OWASP Red team Risk management SCADA Scripting SharePoint SOC SQL SSH TCP/IP Top Secret Top Secret Clearance TS/SCI Vulnerabilities Vulnerability management XSS

    Perks/benefits: Health care

    Region: North America
    Country: United States
    Job stats:  16  2  0

    More jobs like this

    Explore more InfoSec / Cybersecurity career opportunities

    Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.