State of Maryland

DoIT Vulnerability Assessment Analyst Ld/Adv. (#004751)

- Hourly / - BiWeekly /
- Monthly / $95,991.00-$154,928.00 Yearly


GRADE

STD 0023

CLASS ATTRIBUTES

SKILLED SERVICE     BARGAINING UNIT: G  

NATURE OF WORK

A DoIT Vulnerability Assessment Analyst, Lead/Advanced is the lead or advanced level of work providing daily oversight of the vulnerability assessment program, communicating the status of vulnerabilities, and ensuring that the vulnerability assessment service is operating as expected in the Office of Security Management (OSM). Additionally, this position is responsible for ensuring that the data from the vulnerability platform is updating other tools (e.g., Asset Inventory), and that the risk management platform is working as expected. At the lead level, employees in this classification assign, review and approve the work of and train lower-level DoIT Vulnerability Assessment Analysts. At the advanced level, employees in this classification function as a project lead or address the most complex tasks and escalated issues prior to engaging a higher-level IT manager or director.

Employees in this classification receive general supervision from an Executive Cyber Leadership Director or other designated IT administrator.  This position does not supervise.

Positions in this classification are evaluated using the Classification Job Evaluation Methodology. The use of this method involves comparing the assigned duties and responsibilities of a position to the job criteria found in the Nature of Work and Examples of Work sections of a class specification.

This position may require work outside of regular business hours, and work in an on-call capacity.

The DoIT Vulnerability Assessment Analyst I and DoIT Vulnerability Assessment Analyst II are differentiated on the basis of supervisory control by the supervisor over these employees. The DoIT Vulnerability Assessment Analyst I performs duties under close supervision at times and under general supervision at other times depending on the complexity of the specific duty being performed, and the DoIT Vulnerability Management Specialist II performs the full range of duties under general supervision. The DoIT Vulnerability Assessment Analyst II is differentiated from the DoIT Vulnerability Assessment Analyst, Lead/Advanced in that the DoIT Vulnerability Assessment Analyst, Lead/Advanced assigns, reviews and approves the work of and trains lower-level DoIT Vulnerability Assessment Analysts or functions as a project lead or addresses the most complex tasks and escalated issues prior to engaging a higher level IT manager or director.

EXAMPLES OF WORK

When functioning at the Lead level:

Assigns, reviews and approve the work of lower-level DoIT Vulnerability Management Specialists;

Trains lower-level DoIT-Vulnerability Management Specialists

When Functioning at the Advanced Level:

 

Serves as a project lead or technical expert in one or more areas of cyber defense analysis and policy recommendations, regulation compliance and problem solving of network and infrastructure needs for state agencies.

When Functioning at Both Levels:

Analyzes organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.

Conducts and/or supports authorized penetration testing on enterprise network assets;

Maintains deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions;

Maintains knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing;

Prepares audit reports that identify technical and procedural findings, and provides recommended remediation strategies/solutions;

Conducts required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews [TSCM], Telecommunications Electronics Material Protected from Emanating Spurious Transmissions (TEMPEST) countermeasure reviews).

Performs technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications);

Makes recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes);

Performs other related duties.

KNOWLEDGE, SKILLS AND ABILITIES

Knowledge of computer networking concepts and protocols, and network security methodologies; Knowledge of risk management processes (e.g., methods for assessing and mitigating risk); Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy; Knowledge of cybersecurity and privacy principles; Knowledge of cyber threats and vulnerabilities; Knowledge of specific operational impacts of cybersecurity lapses; Knowledge of application vulnerabilities; Knowledge of cryptography and cryptographic key management concepts; Knowledge of data backup and recovery; Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists); Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation); Knowledge of network access, identity, and access management (e.g., public key infrastructure, open authorization (Oauth), OpenID, Security Assertion Markup Language (SAML), Services Provisioning Markup Language (SPML); Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]); Knowledge of programming language structures and logic; Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code); Knowledge of systems diagnostic tools and fault identification techniques; Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities; Knowledge of interpreted and compiled computer languages; Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks); Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored); Knowledge of system administration, network, and operating system hardening techniques; Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks); Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth); Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model); Knowledge of ethical hacking principles and techniques; Knowledge of data backup and restoration concepts; Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems; Knowledge of infrastructure supporting information technology (IT) for safety, performance, and reliability; Knowledge of an organization's information classification program and procedures for information compromise; Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump); Knowledge of cryptology; Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services; Knowledge of penetration testing principles, tools, and techniques; Knowledge of an organization’s threat environment; Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list).

Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems; Skill in assessing the robustness of security systems and designs; Skill in detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort); Skill in mimicking threat behaviors; Skill in the use of penetration testing tools and techniques; Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.); Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.); Skill in reviewing logs to identify evidence of past intrusions; Skill in conducting application vulnerability assessments; Skill in performing impact/risk assessments; Skill to develop insights about the context of an organization’s threat environment; Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Ability to identify systemic security issues based on the analysis of vulnerability and configuration data; Ability to apply programming language structures (e.g., source code review) and logic; Ability to share meaningful insights about the context of an organization’s threat environment that improve its risk management posture; Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

MINIMUM QUALIFICATIONS

Experience: Twelve years of experience in information assurance, incident handling, information assurance vulnerability management and analysis, and assistance programs.

Notes:

1. Candidates may substitute a graduate degree in computer science, cybersecurity, information technology, software engineering, information systems, computer engineering or related field for up to four years of the required experience.

2. Candidates may substitute the “Education” requirement listed above, for a High School Diploma or possession of a High School Equivalency certificate and two additional years of experience as described above.

3. Candidates may substitute the “Experience” requirement listed above with a graduate level degree in Computer science, cybersecurity, information technology, software engineering, information systems, computer engineering or related field from an accredited college or university.

LICENSES, REGISTRATIONS AND CERTIFICATIONS

Must have a Cybersecurity Service Provider (CSSP) Infrastructure Support certification as described on the Maryland Department of Information Technology website.

SPECIAL REQUIREMENTS

Must have a Cybersecurity Service Provider (CSSP) Infrastructure Support certification as described on the Maryland Department of Information Technology website.

ACKNOWLEDGEMENTS

Class Descriptions are broad descriptions covering groups of positions used by various State departments and agencies.  Position descriptions maintained by the using department or agency specifically address the essential job functions of each position. 

This is a Skilled Service classification in the State Personnel Management System. All positions in this classification are Skilled Service positions. Some positions in Skilled Service classifications may be designated Special Appointment in accordance with the State Personnel and Pensions Article, Section 6-405, Annotated Code of Maryland.

This classification is assigned to Bargaining Unit G, Engineering, Scientific and Administrative Professionals classes. As provided by the State Personnel and Pensions Article, Section 3-102, special appointment, temporary, contractual, supervisory, managerial and confidential employees are excluded from collective bargaining. Additionally, certain executive branch agencies are exempt from collective bargaining and all positions in those agencies are excluded from collective bargaining.

Date Established

July 1, 2021

Approved By

Director, Division of Classification and Salary


CLASS: 004751; EST: 7/1/2021; REV: 1/3/2022;

Powered by JobAps