Enable job alerts via email!
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
A leading cybersecurity solutions provider is seeking an Automated Security Validation Analyst to enhance the security posture of DoD networks. The role involves executing security validation scenarios, collaborating with internal teams, and ensuring compliance with DoD policies. Candidates should have a degree in Cybersecurity or a related field, along with significant experience in vulnerability management and penetration testing.
Automated Security Validation Analyst
North Charleston, SC
Secret Clearance required to Start, up to TS may be required
As an Automated Security Validation Analyst, you will perform regular system maintenance, security assessments, and maintain all related documentation. You will collaborate with internal cybersecurity teams to support threat mitigation and remediation efforts. You'll work in a fast-paced, collaborative environment where your contributions directly impact the security posture of DoD networks.
Position Requirements and Duties:
• Execute scheduled and ad-hoc automated security validation scenarios using leading platforms (e.g., Breach and Attack Simulation (BAS) tools, attack surface management platforms).
• Analyze security validation results to identify weaknesses in security controls and validate the effectiveness of remediation efforts.
• Utilize threat intelligence to prioritize validation efforts and simulate real-world attack scenarios based on known adversary TTPs.
• Apply security patches and implement system hardening configurations to address identified vulnerabilities across Director and Actor systems.
• Maintain comprehensive documentation of validation activities, findings, and remediation efforts. Develop clear and concise reports to communicate security risks and recommendations to stakeholders.
• Collaborate with internal cybersecurity teams (threat intelligence, incident response, vulnerability management) to share findings, prioritize remediation efforts, and improve overall security posture.
• Stay current with emerging threats, vulnerabilities, and security technologies. Recommend improvements to security validation processes and tools.
• Ensure compliance with DoD cybersecurity policies, directives, and best practices.
Minimum Qualifications:
• US Citizen
• Bachelor’s Degree in a relevant discipline or at least three years of directly relevant experience.
• Bachelor's Degree in Cybersecurity, Computer Science, or a related field, or equivalent experience.
• 3+ years of experience in cybersecurity, with a focus on vulnerability management, penetration testing, or security validation.
• At least three years of experience with operating systems and network security principles.
• At least 3 years of experience with vulnerability scanning and penetration testing methodologies.
• At least 3 years of experience with at least one scripting language (e.g., Python, PowerShell).
Preferred Qualifications:
• Ability to interpret and apply technical directives and compliance requirements.
• Prior experience supporting Director/Actor system environments or similar C2 platforms.
• Experience with Breach and Attack Simulation (BAS) platforms
• Experience with attack surface management platforms.
• Experience with Director/Actor system environments or similar C2 platforms.
• Experience with RMF (Risk Management Framework) and continuous monitoring processes.
• Familiarity with tools such as Tenable, BigFix, WSUS, or SCCM for patch deployment.
• Strong working knowledge of Windows and/or Linux operating systems.
• Experience with cloud security principles and practices (AWS, Azure, GCP).
• Excellent documentation, reporting, and organizational skills.
• Experience in threat hunting and incident response.
Required Certifications:
• IAT II and CSSP CNDSP Analyst or CSSP Auditor
Company Overview
Adapt Forward is a cybersecurity solutions provider for some of the nation’s most valuable information systems. Leveraging advanced threat assessment technology and experience in building high-level information security infrastructure, we develop adaptive solutions uniquely tailored to our customers’ business objectives to protect sensitive data against sophisticated threats in an increasingly complex security environment.
Summary of Benefits
Equal opportunity employer as to all protected groups, including protected veterans and individuals with disabilities.