Vulnerability Researcher
Job Description:
The Vulnerability Researcher is responsible for identifying weaknesses in networks, systems, and software, and implementing measures to strengthen cybersecurity within the program. This role develops risk‑based mitigation strategies for networks, operating systems, and applications, and compiles and tracks vulnerabilities and remediation results to measure the effectiveness of the program’s security posture. The Vulnerability Researcher also creates and maintains vulnerability management policies, procedures, and training materials, and supports the review and definition of requirements for information security solutions. The position conducts network‑based scans to identify potential attack vectors and host‑based scans to detect vulnerabilities in workstations, servers, and other network hosts.
Key Responsibilities
- Detect vulnerabilities across networks, operating systems, applications, and software.
- Develop risk‑based mitigation strategies to remediate or reduce exposure to identified weaknesses.
- Compile, track, and report vulnerabilities and mitigation results to quantify program performance.
- Create and maintain vulnerability management policies, standard operating procedures, workflows, and training content.
- Review and define requirements for information security technologies and tools.
- Conduct network‑based scans to identify potential security attack paths.
- Perform host‑based scans of workstations, servers, and other network devices to identify vulnerabilities.
- Use cybersecurity assessment tools and analysis techniques to evaluate threat exposure.
- Analyze complex threats and develop actionable mitigation recommendations.
- Support continuous improvement of the vulnerability management program.
Required Qualifications
- Bachelor’s degree in Computer Science, Cybersecurity, Programming, or a related field; or 4 years additional equivalent work experience.
- Minimum of 8 years of experience in vulnerability analysis or a related cybersecurity role.
- Excellent understanding of network security architecture principles and the nature of system, application, and network‑based threats and vulnerabilities.
- Experience with vulnerability assessment tools, scanning platforms, and security technologies.
Preferred Qualifications
- Certifications such as CompTIA CySA+, CompTIA Security+, or Certified Ethical Hacker (CEH).
- Familiarity with enterprise IT environments, threat assessment tools, and vulnerability management frameworks.
- Experience with risk analysis and enterprise vulnerability lifecycle management.
- Strong analytical and problem‑solving skills with the ability to assess complex security issues and develop effective mitigation strategies.
- Effective communication skills with the ability to produce clear technical documentation and reports.
Security Clearance:
- Must be a US citizen (No Dual Citizenship)
- Must possess an active Secret clearance
As required by local law, Accenture Federal Services provides reasonable ranges of compensation for hired roles based on labor costs in the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland. The base pay range for this position in these locations is shown below. Compensation for roles at Accenture Federal Services varies depending on a wide array of factors, including but not limited to office location, role, skill set, and level of experience. Accenture Federal Services offers a wide variety of benefits. You can find more information on benefits here. We accept applications on an on-going basis and there is no fixed deadline to apply.
The pay range for the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland is:
$90,400 - $243,100 USD
Apply for this job
*
indicates a required field