- Hourly / - BiWeekly /
- Monthly / $84,229.00-$136,003.00 Yearly
SKILLED SERVICE BARGAINING UNIT: G NCP
A Department of Information Technology (DoIT) Vulnerability
Assessment Analyst I is the intermediate level of work providing daily
oversight of the vulnerability assessment program, communicating the status of
vulnerabilities, and ensuring that the vulnerability assessment service is
operating as expected in the Office of Security Management (OSM). Additionally,
this position is responsible for ensuring that the data from the vulnerability
platform is updating other tools (e.g., Asset Inventory), and that the risk
management platform is working as expected. Employees in this classification do
not supervise.
Employees
in this classification receive moderate supervision from an Executive Cyber
Leadership Director or other designated IT administrator.
Positions
in this classification are evaluated using the Classification Job Evaluation
Methodology. The use of this method involves comparing the assigned duties and
responsibilities of a position to the job criteria found in the Nature of Work
and Examples of Work sections of a class specification.
This
position may require work outside of regular business hours, and work in an
on-call capacity.
Analyzes an organization's cyber defense
policies and configurations and evaluate compliance with regulations and
organizational directives;
Conducts and/or supports authorized penetration
testing on enterprise network assets;
Maintains deployable cyber defense audit toolkit
(e.g., specialized cyber defense software and hardware) to support cyber
defense audit missions;
Maintains knowledge of applicable cyber defense
policies, regulations, and compliance documents specifically related to cyber
defense auditing;
Prepares audit reports that identify technical
and procedural findings, and provides recommended remediation
strategies/solutions;
Conducts required reviews as appropriate within
environment (e.g., Technical Surveillance, Countermeasure Reviews [TSCM], Telecommunications Electronics Material Protected from
Emanating Spurious Transmissions (TEMPEST) countermeasure reviews).
Performs technical (evaluation of technology)
and nontechnical (evaluation of people and operations) risk and vulnerability
assessments of relevant technology focus areas (e.g., local computing
environment, network and infrastructure, enclave boundary, supporting
infrastructure, and applications);
Make recommendations regarding the selection of
cost-effective security controls to mitigate risk (e.g., protection of
information, systems and processes);
Performs
other related duties.
Knowledge of computer networking concepts and
protocols, and network security methodologies; Knowledge of risk management
processes (e.g., methods for assessing and mitigating risk); Knowledge of laws,
regulations, policies, and ethics as they relate to cybersecurity and privacy;
Knowledge of cybersecurity and privacy principles; Knowledge of cyber threats
and vulnerabilities; Knowledge of specific operational impacts of cybersecurity
lapses; Knowledge of application vulnerabilities; Knowledge of cryptography and
cryptographic key management concepts; Knowledge of data backup and recovery;
Knowledge of host/network access control mechanisms (e.g., access control list,
capabilities lists); Knowledge of cybersecurity and privacy principles and
organizational requirements (relevant to confidentiality, integrity,
availability, authentication, non-repudiation); Knowledge of network access,
identity, and access management (e.g., public key infrastructure, open
authorization (Oauth), OpenID, Security Assertion Markup
Language (SAML), Services Provisioning Markup Language (SPML); Knowledge of how traffic flows across the
network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP],
Open System Interconnection Model [OSI], Information Technology Infrastructure
Library, current version [ITIL]); Knowledge of programming language structures
and logic; Knowledge of system and application security threats and
vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting,
Procedural Language/Structured Query Language [PL/SQL] and injections, race
conditions, covert channel, replay, return-oriented attacks, malicious code);
Knowledge of systems diagnostic tools and fault identification techniques;
Knowledge of what constitutes a network attack and a network attack’s
relationship to both threats and vulnerabilities; Knowledge of interpreted and
compiled computer languages; Knowledge of different classes of attacks (e.g.,
passive, active, insider, close-in, distribution attacks); Knowledge of cyber attackers
(e.g., script kiddies, insider threat, non-nation state sponsored, and nation
sponsored); Knowledge of system administration, network, and operating system
hardening techniques; Knowledge of cyber-attack stages (e.g., reconnaissance,
scanning, enumeration, gaining access, escalation of privileges, maintaining
access, network exploitation, covering tracks); Knowledge of network security
architecture concepts including topology, protocols, components, and principles
(e.g., application of defense-in-depth); Knowledge of security models (e.g.,
Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model);
Knowledge of ethical hacking principles and techniques; Knowledge of data
backup and restoration concepts; Knowledge of system administration concepts
for operating systems such as but not limited to Unix/Linux, IOS, Android, and
Windows operating systems; Knowledge of infrastructure supporting information
technology (IT) for safety, performance, and reliability; Knowledge of an
organization's information classification program and procedures for
information compromise; Knowledge of packet-level analysis using appropriate
tools (e.g., Wireshark, tcpdump); Knowledge of cryptology; Knowledge of network
protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS),
and directory services; Knowledge of penetration testing principles, tools, and
techniques; Knowledge of an organization’s threat environment; Knowledge of
Application Security Risks (e.g. Open Web Application Security Project Top 10
list).
Skill in conducting vulnerability scans and
recognizing vulnerabilities in security systems; Skill in assessing the
robustness of security systems and designs; Skill in detecting host and network-based
intrusions via intrusion detection technologies (e.g., Snort); Skill in
mimicking threat behaviors; Skill in the use of penetration testing tools and
techniques; Skill in the use of social engineering techniques. (e.g., phishing,
baiting, tailgating, etc.); Skill in using network analysis tools to identify
vulnerabilities. (e.g., fuzzing, nmap, etc.); Skill in reviewing logs to
identify evidence of past intrusions; Skill in conducting application
vulnerability assessments; Skill in performing impact/risk assessments; Skill
to develop insights about the context of an organization’s threat environment;
Skill to apply cybersecurity and privacy principles to organizational
requirements (relevant to confidentiality, integrity, availability,
authentication, non-repudiation).
Ability to identify systemic security issues
based on the analysis of vulnerability and configuration data; Ability to apply
programming language structures (e.g., source code review) and logic; Ability
to share meaningful insights about the context of an organization’s threat
environment that improve its risk management posture; Ability to apply
cybersecurity and privacy principles to organizational requirements (relevant
to confidentiality, integrity, availability, authentication, non-repudiation).
Experience: Six years of experience in information assurance, incident handling, information assurance vulnerability management and analysis, and assistance programs.
Notes:
1. Candidates may substitute a bachelor’s degree in computer science, cybersecurity, information technology, software engineering, information systems, computer engineering or related field for up to four years of the required experience.
2. Candidates may substitute the “Education” requirement
listed above, for a High School Diploma or possession of a High School Equivalency
certificate and two additional years of experience as described above.
3. Candidates may substitute the “Experience” requirement
listed above with a graduate level degree in Computer science, cybersecurity,
information technology, software engineering, information systems, computer
engineering or related field from an accredited college or
university.
Must have a Cybersecurity
Service Provider (CSSP) Infrastructure Support
certification as described on the Maryland Department of Information Technology
website.
Employees in this classification may be subject to
call-in 24 hours a day and, therefore, may be required to provide the employing
agency with a telephone number where the employee can be reached. Employees may
be furnished with a pager or cell phone.
Applicants for this classification may handle sensitive
data. This will require a full scope background investigation prior to
appointment. A criminal conviction may be grounds for rejection of the
applicant.
Employees may occasionally be required to travel to field
locations and must have access to an automobile in the event a state vehicle
cannot be provided. Standard mileage allowance will be paid for use of a
privately owned vehicle.
Class
Descriptions are broad descriptions covering groups of positions used by
various State departments and agencies. Position descriptions maintained
by the using department or agency specifically address the essential job
functions of each position.
This is a Skilled Service
classification in the State Personnel Management System. All positions in this
classification are Skilled Service positions. Some positions in Skilled Service
classifications may be designated Special Appointment in accordance with the
State Personnel and Pensions Article, Section 6-405, Annotated Code of
Maryland.
This classification is assigned to Bargaining Unit G, Engineering, Scientific
and Administrative Professionals classes. As provided by the State Personnel
and Pensions Article, Section 3-102, special appointment, temporary,
contractual, supervisory, managerial and confidential employees are excluded
from collective bargaining. Additionally, certain executive branch agencies are
exempt from collective bargaining and all positions in those agencies are
excluded from collective bargaining.
This classification is one
level in a Non-Competitive Promotion (NCP) series. NCP promotions are
promotions by which employees may advance in grade and class level from trainee
to full performance level in a classification series. In order to be
non-competitively promoted to the next level in a NCP series, an employee must:
1) perform the main purpose of the class, as defined by the Nature of Work
section of the class specification; 2) receive the type of supervision defined
in the class specification and 3) meet the minimum qualifications of the
classification.
July 1, 2021
Director, Division of
Classification and Salary