Vulnerability Management Engineer
$87,100 - $157,450/year
Role Details
The Vulnerability Management Engineer- Mid supports SEC ISS contract objectives by identifying, prioritizing, and driving remediation of security vulnerabilities across enterprise infrastructure and cloud-connected environments. This role strengthens SEC risk posture by aligning vulnerability management activities with NIST and FISMA requirements, including support for audit readiness and continuous monitoring outcomes. The engineer works across operations, engineering, and system owner teams to reduce exposure through timely patching, hardening, and POA&M closure. This position also delivers clear reporting to leadership and contributes to incident response for vulnerability-related events.
PRIMARY RESPONSIBILITIES:
Vulnerability Assessment and Analysis
-
Perform recurring vulnerability assessments across servers, endpoints, network devices, and relevant cloud-hosted assets using approved scanning tools.
-
Analyze scan results for severity, exploitability, asset criticality, and business impact to prioritize remediation actions.
- Validate findings by identifying false positives, duplicates, and exceptions to maintain accurate risk data.
- Maintain visibility of open vulnerabilities and aging risk across the enterprise environment.
- May require participation in on-call or surge support activities depending on operational needs.
Remediation Coordination and Risk Reduction
-
Coordinate with system owners, engineering teams, and operations staff to execute timely remediation plans.
-
Track and manage Plans of Action and Milestones (POA&Ms) through resolution, including status updates and risk disposition.
-
Support patch management and secure configuration hardening activities aligned to approved baselines and SOPs.
- Identify recurring root causes and recommend control improvements to reduce reintroduction of vulnerabilities.
Governance, Compliance, and Process Management
-
Develop, maintain, and improve vulnerability management policies, procedures, and standard operating processes.
-
Support risk management and compliance efforts by producing documentation and artifacts for FISMA-related reviews and audits.
-
Ensure vulnerability and remediation activities are documented in approved ticketing/workflow systems in accordance with service management practices.
-
Collaborate with stakeholders to align vulnerability operations with contract governance, reporting cadence, and control objectives.
Reporting and Incident Support
-
Generate dashboards and reports for leadership on vulnerability trends, remediation progress, POA&M status, and compliance posture.
-
Communicate technical findings and remediation priorities to both technical and non-technical stakeholders.
-
Support incident response activities tied to discovered or exploited vulnerabilities, including triage and cross-team coordination.
-
Provide metric-driven recommendations to improve continuous monitoring effectiveness and risk reduction outcomes.
REQUIRED QUALIFICATIONS:
-
This position is restricted to U.S. citizens only. Applicants must not hold dual citizenship with any other country to be eligible for work under this contract.
-
The ability to obtain and maintain SEC Public Trust (or higher if required).
-
Bachelor's degree with 4+ years of experience in vulnerability management and remediation within enterprise IT environments.
-
Strong understanding of security frameworks, risk assessment methodologies, and compliance standards, including NIST and FISMA.
-
Experience coordinating remediation with system owners and technical teams, including vulnerability tracking and POA&M closure.
-
Strong analytical, problem-solving, and technical communication skills for mixed technical and business audiences.
-
Vulnerability scanning and assessment platforms (e.g., Tenable Nessus, Qualys, Rapid7).
-
Patch management processes, configuration baselines, and secure system hardening practices.
-
Knowledge of enterprise infrastructure, operating systems, and cloud environments.
-
Familiarity with automation scripts for vulnerability remediation and reporting.
-
Reporting and dashboard development for compliance and leadership visibility.
PREFERRED QUALIFICATIONS:
-
Experience supporting federal civilian agency environments with FISMA/RMF continuous monitoring requirements.
-
Demonstrated success reducing high-severity vulnerability backlog and improving closure timelines in large enterprises.
-
Experience integrating vulnerability management activities with SOC operations and incident response workflows.
-
Experience building automated remediation/reporting workflows using enterprise automation and analytics tools.
-
Advanced cybersecurity certification progression (e.g., CISSP, GIAC, or equivalent) beyond baseline requirements.
-
CompTIA Security+, CEH, CISSP Associate.
If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares.
Original Posting:
April 23, 2026
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $87,100.00 - $157,450.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
For more details click Job Post.
About Leidos
Leidos is an industry and technology leader serving government and commercial customers with smarter, more efficient digital and mission innovations.