Goldbelt, Inc.

Network Vulnerability Engineer

Job Locations JP-Kadena
Position Type
Regular Full-Time


Nisga’a CIOPS is honored to provide services to those who are committed to our national defense, security, and mission. We consider it our duty to provide services that ensure mission assurance and execution to our customers. We provide a level of capabilities and services that instills confidence in those we support.



Nisga’a CIOPS is seeking for a Network Vulnerability Engineer at Kadena Airbase Japan.


Essential Job Functions:

  • Responsible for vulnerability management (scanning, patching, reporting metrics).
  • The position will follow USAF MPTO 00-33-1109A, USCYCOM CND Directives, TASKORDs, OPORDs and track TCNO/IAVMs.
  • The metric reporting is critical to targeting vulnerabilities and mitigations.
  • Objectives focus on improving cyber security.
  • Create/maintain/distribute ACAS Reports to chain of command POCs.
  • Produce report to chain of command informing of patching status.
  • Conduct Discovery scanning to identify unknown base assets.
  • Conduct Vulnerability scanning via ACAS/ on 100% of assets during assigned scan schedule.
  • Coordinate with Microsoft SCCM/MECM teams upon scan result analysis (monthly) to identify patching issues/troubleshooting way ahead.
  • Maintain IP space and asset lists to cover 100% base assets.
  • Maintain credentials to scan for 95% accuracy on base assets to include PMO systems.
  • Produce asset lists to identify devices not capable of McAfee Agent install (whitelists).


Necessary Skills and Knowledge:

  • Air Force Network Infrastructure knowledgebase and current device type understanding Possess understanding of HBSS/ePO functions Produce asset lists to identify devices capable of McAfee Agent install.

Minimum Qualifications:

  • ACAS Certificate of training and experience within the last 2-3 years DODI 8570 Requirement IAT Level 2 TS/SCI or SCI eligible.


Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed