Back to Jobs

Vulnerability Management Analyst; Structured Threat Analyst ADVANA

Remote, USA Full-time Posted 2025-11-24
Position: Vulnerability Management Analyst (Structured Threat Analyst 3) ADVANA Search by Keyword (use Keyword for Remote Positions) Select how often (in days) to receive an alert: Vulnerability Management Analyst (Structured Threat Analyst 3) ADVANA Location: Fairfax, VA, Virginia, United States Requisition Number:27377 Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range:$-$ Security Clearance: Top Secret Level of Experience: Mid This opportunity resides with Warfare Systems (WS), a business group within HII’s Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5 ISR systems. HII works within our nation’s intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.S. military and federal agency partners. Meet HII’s Mission Technologies Division Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense – the data evolution – by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5 ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that’s right for you. Apply today. We look forward to meeting you. Come Join HII! Where Hard Stuff is Done Right! HII - Mission Technologies is currently seeking a Junior Vulernability Management Analyst to work out of Fairfax, VA in support of the DoD/DoW Advana War Data Platform designed to aggregate operational, intelligence, logistics, and sensor data from multiple domains, enable Joint All-Domain Command and Control (JADC2) by providing a common data fabric, and support AI/ML applications for predictive analytics, targeting, and mission planning. This position is contingent on contract award. Responsibilities: I want to and can do that! • Supports enterprise vulnerability management operations for Department of Defense mission systems across unclassified and classified environments. • Performs day-to-day validation of vulnerability scan results generated by ACAS, endpoint security platforms, and cloud security tools to confirm accuracy, scope, and system relevance. • Tracks vulnerability findings and remediation actions within POA&M repositories, Service Now workflows, and continuous monitoring dashboards to maintain current authorization status. • Coordinates directly with system owners, administrators, and cybersecurity teams to collect remediation evidence, confirm patch application, and document mitigation actions. • Assists with identification and documentation of false positives and compensating controls under guidance of senior analysts. • Maintains detailed records supporting Risk Management Framework activities, including vulnerability aging, remediation progress, and outstanding risk conditions. • Prepares routine vulnerability status reports, remediation summaries, and data inputs for leadership briefings using SharePoint and reporting tools. • Supports deviation and risk acceptance requests through evidence gathering and baseline documentation. • Participates in vulnerability management reviews, remediation planning sessions, and operational coordination meetings with government and contractor stakeholders. • Contributes to improved cyber hygiene, reduced exposure timelines, and sustained authorization posture while reinforcing program values of accountability, consistency, transparency, and mission-focused risk reduction. Requirements: I have already done that or have it! • 2 years relevant experience with Bachelors in related field; 0 years experience with Masters in related field; or High School Diploma or equivalent and 6 years relevant experience. • IAM I (CompTIA Security+ CE, ISC² CAP, ISC² SSCP, or GIAC GSLC) certified. • Must have an active Top Secret security clearance. • U… Apply tot his job Apply To this Job

Similar Jobs