Typically, the work is performed remotely.
Description:
Business and Information Systems (BIS) - Infrastructure - Endpoint Engineering (BIS-EE) group provides endpoint management capabilities in managing Windows, macOS, ipadOS, iOS, and Android client endpoints to Lab Operations as well as “commodity” computers in two different directorates. In adherence to ANL policy for eradicating vulnerabilities, BISEE utilizes various configuration management tools and platforms to configure endpoints and remediate vulnerabilities.
The client’s Cyber Security Program Office (CSPO) promotes the safe and secure use of technology. The CSPO serves the client by providing a variety of cybersecurity services including consultation, protection technologies, detection technologies, cybersecurity education and awareness, cybersecurity incident management, vulnerability management, compliance, and cybersecurity risk management.
BIS-EE is seeking a full-time Endpoint Security Engineer to assist in improving our endpoint cyber hygiene and vulnerability management program in collaboration with the CSPO.
Scope
The Endpoint Security Engineer will work closely with BIS-EE and CSPO.
Objectives
The ideal candidate will work with and support the projects and tasks associated with endpoint security and endpoint vulnerability management.
Tasks and Delivery (Job Description)
The Endpoint Security Engineer (contractor) will be embedded within the endpoint engineering team (3 Windows engineers, 2 macOS engineers) to enhance security operations and strengthen the security posture of client workstations. Typical responsibilities include:
Vulnerability Management & Analysis
Identify, analyze, and prioritize endpoint vulnerabilities using tools such as Tenable, Axonius, Jamf Pro, SCCM, Intune, Active Directory, and Entra.
Assess environmental and operational factors that may impact remediation feasibility and timelines.
Provide risk-based recommendations to improve the vulnerability management program.
Endpoint Remediation, Automation & Documentation
Develop, test, and deploy remediation scripts and configurations for Windows and macOS endpoints using tools such as Jamf, ConfigMgr/SCCM, Intune, and Group Policy.
Write clear, maintainable scripts and automation (e.g., modular logic, meaningful naming, basic error handling and logging) that can be reused by the team.
Document scripts and configurations with purpose, parameters, usage instructions, and any security considerations to support troubleshooting and cross-team adoption.
Maintain an organized library of remediation artifacts; if applicable, help establish and use a version-controlled repository (e.g., Git) to track changes and support basic peer review.
Baseline Configuration & Compliance
Contribute to secure baseline configurations aligned with the client CSPP, NIST 800-53 Rev 5, CIS Benchmarks, Microsoft Security Baselines, DISA STIGs, and/or macOS Security Compliance Project.
Assist in development, testing, implementation, documentation of baseline configurations.
Monitor baseline implementation for coverage, effectiveness, unapproved deviations, and required changes.
Collaboration & Reporting
Participate in regular team meetings to provide status updates, propose improvements, and discuss implementation strategies.
Monitor endpoint compliance and provide reports on remediation effectiveness and baseline configurations to leadership and stakeholders.
Required Knowledge, Skills, and Abilities
Level 3 or 4 candidate from Appendix C. The ideal candidate will bring endpoint engineering expertise, strong cyber security skills, and modern, secure coding practices with 3–5 years of experience in complex large enterprise environments.
Endpoint Management
Hands-on expertise with SCCM, Jamf Pro, and/or Microsoft Intune for Windows and macOS endpoints.
Experience packaging and deploying applications, security updates, and scripts across enterprise platforms.
Familiarity with Group Policy and Intune for configuration management.
Secure Coding & SDLC Practices
Proficiency in automation scripting (PowerShell, Bash, Python) with emphasis on modular, reusable, and secure code.
Strong grasp of SDLC principles: requirements gathering, design, implementation, testing, deployment, and maintenance.
Experience with version control systems (Git) and collaborative development workflows (branching, pull requests, peer review).
Ability to document code and remediations clearly for cross-team adoption and knowledge transfer.
Security Frameworks & Compliance
Knowledge of CVE program, NIST Vulnerability Database, CISA Known Exploited Vulnerability Database, and overall vulnerability management processes.
Experience implementing NIST 800-53 Rev 5, CIS Benchmarks, DISA STIGs, Microsoft Security Baselines, and macOS Security Compliance Project.
Ability to translate technical fixes into measurable improvements in endpoint security posture.
Experience using Tenable.SC or Tenable.VM as part of vulnerability management.
Soft Skills
Strong problem-solving skills with a focus on reducing organizational risk.
Effective communication skills to convey technical concepts to both technical and non-technical stakeholders.
Collaborative mindset for working within a mixed Windows/macOS engineering team.
Notes:
Typically, the work is performed remotely.
Work schedule is normal business hours 8:30am – 5:00pm CST, Monday through Friday.
VIVA is an equal opportunity employer. All qualified applicants have an equal opportunity for placement, and all employees have an equal opportunity to develop on the job. This means that VIVA will not discriminate against any employee or qualified applicant on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status