2022 Exelon Hiring Update
Our hiring process looks a bit different today as a result of the COVID-19 pandemic, with virtual interviewing and other solutions in place to facilitate proper social distancing, we remain focused on powering possibilities for new talent who are ready to join us in making a difference.

Exelon was recently separated into two publicly traded companies, Exelon and Constellation. Exelon is the parent company for our fully regulated transmission and distribution utilities, delivering electricity and natural gas to more than 10 million customers. Constellation is the largest supplier of clean energy and sustainable solutions to homes, businesses and public-sector customers across the continental U.S., backed by more than 31,000 megawatts of generating capacity consisting of nuclear, wind, solar, natural gas and hydro assets. If you are looking for career opportunities in commercial, generation or home services, please visit jobs.constellationenergy.com for more information.

Sr Cyber Sec Vul Assess Anlst

This job posting is no longer active.

Location: , Hybrid Remote, United States
Organization: Exelon Business Servcs Co, LLC
Job ID: 241852
Date Posted: Aug 20, 2022
Job: Security

Share: mail

Job Description

Description

Be a part of something powerful at America's premier energy provider!

At Exelon, we are united by our values and shared vision for a cleaner and brighter future. We encourage curiosity, value diverse perspectives and we never stop looking for ways to be, work and do better. We know the future is in our hands. That's why we're looking for people like you, who have the power to make a difference.

As the nation's largest utility company, we serve more than 10 million customers through six fully regulated transmission and distribution utilities: Atlantic City Electric (ACE), Baltimore Gas and Electric (BGE), Commonwealth Edison (ComEd), Delmarva Power & Light (DPL), PECO Energy Company (PECO), and Potomac Electric Power Company (Pepco). All 18,000 of us are committed to delivering safe, reliable and affordable energy to our customers, strengthening our communities, supporting a clean energy future and reducing our impact on the changing climate.

Our people are the heart and soul of our business. Whether it's powering lives, supporting communities or collaborating with colleagues, an Exelon employee is talented, compassionate, forward-thinking and inspired. We are empowered to evolve and advance our careers in an open and inclusive environment. We pride ourselves on being the kind of place where people want to come and stay. We know that investing in our employees' futures strengthens ours, which is why we offer competitive compensation, incentives and health and retirement benefits.

 

PRIMARY PURPOSE OF POSITION 

The Lead Cyber Security Vulnerability Assessment Analyst will be expected to conduct formal tests on web-based applications, networks, and other types of computer systems on a regular basis, and determines/documents deviations from approved configuration standards and/or policies. This role will also be expected to work on physical security assessments of servers, computer systems, and networks. Along with these tests and assessments, this role will conduct regular security vulnerability assessments from both a logical/theoretical standpoint and a technical/hands-on standpoint, and recommend appropriate mitigations and/or remediation efforts. This role will enhance security services provided by the Cyber Vulnerability Detection and Management team.  This is a hands-on role requiring expert technical skills across a wide range of IT/OT systems, applications, and infrastructure

 

PRIMARY DUTIES AND ACCOUNTABILITIES 

  • Perform technical application and infrastructure security vulnerability assessments across a wide range of IT/OT systems, including applications, wireless and wired networks, web services, mobile applications, thick clients, Cloud solutions, etc.

  • Work with the Business to effectively communicate the risks of identified vulnerabilities and make recommendations regarding the selection of cost-effective security controls to mitigate identified risks

  • Develop/refine necessary governance documentation (policies, procedures, standards, guidelines) for all security vulnerability assessment processes

  • Collaborate with various teams (IT, Development, QA, etc) to help ensure designs and implementations meet specified security standards

  • Prepare detailed cyber security vulnerability metrics and reports for all Business Units and leadership (routine and ad hoc)

Qualifications

 MINIMUM QUALIFICATIONS

 

  • Bachelor’s Degree in Computer Science, Information Technology (IT), or a related discipline, and typically 8 or more years of solid, diverse experience in cyber security vulnerability assessments, or equivalent combination of education and work experience.

  • At least 5-8 years of ethical hacking experience including experience in Information Security, application vulnerability testing, code-level security auditing, and secure code reviews.

  • Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.             

  • Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).         

  • Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).           

  • Knowledge of network protocols (e.g., Transmission Critical Protocol/Internet Protocol [TCP/IP], Dynamic Host Configuration Protocol [DHCP]), and directory services (e.g., Domain Name System [DNS]).      

  • Knowledge of penetration testing principles, tools, and techniques. 

  • Knowledge of scripting/programming language structures and logic.

  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

  • Knowledge of host/network access control mechanisms (e.g., access control list).

  • Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).

  • Knowledge of interpreted and compiled computer languages

  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution)

  • Knowledge of threat environments

  • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).

  • Knowledge of infrastructure supporting information technology (IT) for safety, performance, and reliability.     

  • Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation or privileges, maintaining access, network exploitation, covering tracks).    

  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).       

  • Knowledge of basic system administration, network, and operating system hardening techniques.

  • Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems.

  • Comprehensive understanding of change management techniques associated with new technology implementation

  • Demonstrated experience producing an economic business case.

  • Demonstrated leadership ability

  • Proven analytical, problem solving, and consulting skills

  • Excellent communication skills and the proven ability to work effectively with all levels of IT and business management

 

PREFERRED SKILLS

  • Graduate degree in cyber security or related area of expertise.

  • Relevant security certifications (CISSP, CISM, SABSA, GIAC)

  • Demonstrated expert technical skills with various penetration testing technologies and tools

  • Demonstrated experience and subject matter knowledge in cyber and information security for applications, web architectures, operating systems, databases, and networks.

  • Demonstrated experience and subject matter knowledge of SCADA, ICS, Distribution Automation, Smart Grid, DMS, and ECS systems architecture in relation to evaluating risk.

  • Demonstrated experience and proven capabilities in network vulnerability assessment, application vulnerability assessment, application security architecture development, web application security, and application security testing.

  • Demonstrated experience in addressing regulatory compliance for the security requirements in applicable laws and regulations, such as NERC CIP, SOX, PCI DSS, and HIPAA.

  • Solid understanding and experience with security development lifecycle (SDL) processes for internally developed applications, including the web-based and Internet facing components.

  • Demonstrated knowledge and experience in application security standards, methodologies, and technologies.

  • Solid understanding to assess application and web architectures and operating systems for vulnerabilities and develop appropriate security countermeasures.

  • Solid knowledge and experience with IT security aspects of operating systems, Active Directory, database (SQL) access, LDAP, Microsoft SharePoint, and web server configurations.

  • Demonstrated experience in assessing and testing security applications and systems, such as Cisco firewalls, security appliances, IDS/IPS, SSL or TLS, IPSec, and web services security.

  • Ability to demonstrate analytical skills, technical knowledge, and practical application of cyber and information security principles to business leaders and technical staff

  

Share: mail
 

Frequent Job Searches

Recently Viewed Jobs

Most Recent Job Searches

Relevant Jobs

Personalize this site