Deadline Date: Wednesday 11 January 2023
Requirement: Online Vulnerability Tool Manager
Location: Mons, BE
Full time on-site: Yes
NATO Grade: G15/88
Total Scope of the request (hours): 654
Required Start Date: 6 February 2023
End Contract Date: 31 December 2023
Required Security Clearance: NATO SECRET
Previously proposed candidates were non-compliant for the following reasons:
- Candidates’ latest hand on experience in system administration were not satisfactory for the position
- Candidate’s experience in systems, tools administration and troubleshooting is not satisfactory for the position
Duties & Role:
As Online Vulnerability Tool Manager (OVA), the incumbent will be responsible for supporting Cyber Defence operations, maintaining and updating Vulnerability Assessment (VA) systems.
He will report to the Head, Security Tools Management Section and collaborating with the personnel from Cyber Hygiene and CS Operations Branches. They will also work with the Staff of Platform and Infrastructure Management Section for the maintenance of the platform. The tasks include - but are not limited to – define, install and maintain advance VA configuration and associated operational functionalities, as well as and ensuring they are integrated with other NCIRC capabilities where possible.
The OVA Tool Manager will be in charge of ensuring VA systems meet security requirements defined by NCSC, identifying also areas of improvement.
- Install, deploy, update, monitor, maintain, configure, troubleshoot and keep in operational conditions the Vulnerability Assessment (VA) systems.
- Configure the VA systems to support vulnerability, compliance and remediation verification scanning.
- Define, maintain, update advanced VA configurations, e.g. low performance impact VA scans, and audit files that implement specific hardening guides.
- Troubleshoot issues arising from vulnerability scanning and serve as technical expert for online vulnerability assessment tools.
- Ensure the level of security (Confidentiality, Integrity, and Availability) of the VA systems meet or exceed the minimum security requirements defined by NATO security authorities.
- Compile, draft, review and deliver inputs on all aspects relevant to VA capabilities and VA scan results and processes, and associated documentation.
- Develop reports and dashboards that reflect the Online VA systems availability, scans performance, success/failure effectiveness and efficiency and perform targeted historical analysis, review historical trending data and recommend improvement opportunities.
- Perform functions to ensure Cyber Security Hygiene Indicators (CSHI) programme is implemented effectively and efficiently.
- Develop the NCI Agency specific Request for Change formal documentation for VA products, configure the test of the VA systems and provide support for conducting functional and security tests required by the Change Management processes for having the systems approved to be used on NCI Agency managed networks.
- Produce metrics to be integrated into wider CSSL or NCI Agency products that are being delivered up to NATO executive management level.
- Initiate, prepare, follow and defend the specialist applications upgrades in front of the Change Management Board.
- Implement the approved changes.
- Proactively recommend optimizations to VA capabilities to provide effective and efficient service operations.
- Maintain awareness of new technologies and developments, industry standards and best practices within the wider IA community and provide support for the selection of the vulnerabilities management and vulnerabilities assessment tools.
- Produce technical reports and support the production of executive level reports.
- Review security documentation and provide technical advice.
Skill, Knowledge & Experience:
- The candidate must have a currently active NATO SECRET security clearance
- Essential to have a Bachelor's Degree in Computer Science combined with a minimum of 2 years' experience in Vulnerability Assessment related post as Tool Manager or similar position involving Technical ICT Engineering knowledge, or a Secondary education and completed advanced vocational education (leading to a professional qualification or professional accreditation) with 5 years post related experience.
- Experience in implementation of INFOSEC policies and procedures.
- Software engineering including programming and/or scripting knowledge (python, shell scripting, PowerShell).
- Knowledge of Windows and Linux Operating Systems.
- Knowledge of risk based Security Assessment of systems and networks.
- Comprehensive knowledge of the principles of computer and communication security, networking, and the vulnerabilities of modern operating systems and applications.
- Practical hands-on experience in systems and tools administration.
- Demonstrable expert knowledge of Tenable Security Center / Tenable Nessus products
- Ability to investigate and analyse complex scenarios and solve problems in innovative ways
- Excellent communication abilities, both written and verbal, with the ability to clearly and successfully articulate complex issues to a variety of audiences and teams
- Experience in defining, implementing and validating NCIA CSSL security settings
- Industry leading certification in the area of Cybersecurity such as CISSP, CISM, MCSE/S, CISA, GSNA, SANS GIAC.
- Tenable Certified Security Engineer
- Prior experience of working in an international environment comprising both military and civilian elements.