Vulnerability Management Analyst; Structured Threat Analyst ADVANA
Fairfax, Fairfax County, Virginia, 22032, USA
Listed on 2026-03-02
-
IT/Tech
Cybersecurity, Information Security
Search by Keyword (use Keyword for Remote Positions)
Select how often (in days) to receive an alert:
Vulnerability Management Analyst (Structured Threat Analyst3) ADVANA
Location: Fairfax, VA, Virginia, United States
Requisition Number:27377
Required Travel: 0 - 10%
Employment Type:
Full Time/Salaried/Exempt
Anticipated Salary Range:$-$
Security Clearance:
Top Secret
Level of
Experience:
Mid
This opportunity resides with Warfare Systems (WS), a business group within HII’s Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5
ISR systems.
HII works within our nation’s intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.S. military and federal agency partners.
Meet HII’s Mission Technologies DivisionOur team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense – the data evolution – by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5
ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that’s right for you. Apply today. We look forward to meeting you.
HII - Mission Technologies is currently seeking a Junior Vulernability Management Analyst to work out of Fairfax, VA in support of the DoD/DoW Advana War Data Platform designed to aggregate operational, intelligence, logistics, and sensor data from multiple domains, enable Joint All-Domain Command and Control (JADC2) by providing a common data fabric, and support AI/ML applications for predictive analytics, targeting, and mission planning.
This position is contingent on contract award.
Responsibilities: I want to and can do that!- Supports enterprise vulnerability management operations for Department of Defense mission systems across unclassified and classified environments.
- Performs day-to-day validation of vulnerability scan results generated by ACAS, endpoint security platforms, and cloud security tools to confirm accuracy, scope, and system relevance.
- Tracks vulnerability findings and remediation actions within POA&M repositories, Service Now workflows, and continuous monitoring dashboards to maintain current authorization status.
- Coordinates directly with system owners, administrators, and cybersecurity teams to collect remediation evidence, confirm patch application, and document mitigation actions.
- Assists with identification and documentation of false positives and compensating controls under guidance of senior analysts.
- Maintains detailed records supporting Risk Management Framework activities, including vulnerability aging, remediation progress, and outstanding risk conditions.
- Prepares routine vulnerability status reports, remediation summaries, and data inputs for leadership briefings using SharePoint and reporting tools.
- Supports deviation and risk acceptance requests through evidence gathering and baseline documentation.
- Participates in vulnerability management reviews, remediation planning sessions, and operational coordination meetings with government and contractor stakeholders.
- Contributes to improved cyber hygiene, reduced exposure timelines, and sustained authorization posture while reinforcing program values of accountability, consistency, transparency, and mission-focused risk reduction.
- 2 years relevant experience with Bachelors in related field; 0 years experience with Masters in related field; or High School Diploma or equivalent and 6 years relevant experience.
- IAM I (CompTIA Security+ CE, ISC² CAP, ISC² SSCP, or GIAC GSLC) certified.
- Must have an active Top Secret security clearance.
- U…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).