Quick Job Search
Keywords:
Company Name:
Job Type:
Location:
Job Seeker Tools
Latest Jobs
Job Seeker Tools
Your Saved Jobs
Build Your Professional Profile
Similar Jobs
KBR
Electronic Technician in Jacksonville, FL
WALGREENS
Shift Lead in Gainesville, FL
Bank of America
AML Refresh Ops - Ops Sr Analyst MKTS in Jacksonville, FL
University of Miami
Assistant Professor of Clinical - Otolaryngology, Head and Neck Surgery in Miami, FL
PetSmart
Retail Sales Associate Part Time in Orlando, FL
PetSmart
Pet Groomer & Salon Trainer in Orange Park, FL
Truist Financial
Premier Advisor - Winter Park, FL in Winter Park, FL
Featured Employers
Vulnerability Information Security Analyst
Company: General Dynamics IT
Location: Tampa, FL
Employment Type: Full Time
Date Posted: 01/17/2026
Job Categories: Engineering, Information Technology
Job Description
Vulnerability Information Security Analyst

Please take this opportunity to join one of GDITs fastest long-standing growing programs! US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting edge program supporting DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war fighter and their missions. We are seeking a creative and driven professional with a passion for solving real world issues on a cross-functional, fast paced team.

The Vulnerability Analyst is a strong, self-motivated, solution-oriented individual who will be joining an experienced team to support the implementation and sustainment of ACAS across multiple networks. We are looking for an experienced, innovative, and enthusiastic analyst to join us in delivering high quality IT systems.

Responsibilities:

  • Conduct and Manage ACAS Vulnerability Scanning, including Tenable.sc, Nessus Agent and Nessus Network Monitor.
  • Analyze policies, configurations, and evaluate compliance with regulations and directives.
  • Maintain knowledge of applicable policies, regulations, and compliance documents specifically related to ACAS.
  • Perform vulnerability assessments and security reviews to identify weaknesses and vulnerabilities within systems that affect the confidentiality, integrity and availability of data.
  • Analyze vulnerability reports and suggest remediation / mitigation plans.
  • Coordinate with cybersecurity administrators to improve security tools for monitoring and increasing coverage of existing tools.
  • Collect, aggregate, synthesize, analyze and report on data from multiple sources and formats.
  • Provide technical support to system owners to propose mitigation and remediation solutions to identified vulnerability and security issues.
  • Leverage enterprise methodologies and patterns.
  • Develop high level system design diagrams and system documentation.
  • Evaluate, analytically and systematically, problems with workflows, organization and planning and develop appropriate corrective actions.
  • Excellent written and verbal communication skills, with a strong attention to detail and superior ability for problem solving.
  • Skilled at directing a small team and executing responsibilities without direct supervision.

Required Qualifications:

  • 3+ years of technical experience required.
  • BA/BS required - may substitute additional years of experience
  • A minimum of two (2) years' experience in building, maintaining, and supporting ACAS related technologies: Tenable.sc, Nessus Agent, and Nessus Network Monitor.
  • Experience with data analytics, preferably using Excel.
  • Must possess and maintain a TS/SCI clearance.
  • Must be IAT level II compliant with DoD 8570.1.
  • ITIL V4 Foundation within six months of hire.
  • Must have completed ACAS Operator and Supervisor course within the last three years.
  • May be required to work evening, weekend, and holiday hours as required.

Preferred Qualifications:

  • Knowledge of how traffic flows across the network (TCP/IP, OSI, ITIL).
  • Skilled in conducting vulnerability scans and recognizing vulnerabilities in systems.
  • Developing and presenting briefings to senior leadership.
Contact Information
Apply Now | Forward Job to a Friend | More Jobs From This Employer