This role is designed for experienced cybersecurity practitioners to participate in a skills assessment pilot aligned to the Vulnerability Assessment Analyst (Work Role 541). The purpose of this engagement is assessment validation and standard-setting, not hiring, ranking, or performance evaluation.
The Contract SME will complete a structured assessment and a brief survey only. This role does not include teaching, instructional design, content creation, consulting, or advisory responsibilities.
Scope of Work
- Complete a practitioner-level skills assessment
- Complete a short post-assessment survey
- No meetings, facilitation, reviews, or follow-up work
This is a finite, transactional engagement with clearly defined deliverables.
Time Commitment
- Estimated assessment length: ~120 items
- Estimated completion time: Approximately 1 hour
- Assessment window: Must be completed within a defined access period (typically 5 business days once access is granted)
- Once started, the assessment must be completed within 24 hours
Candidates must be current practitioners with applied, real-world experience performing vulnerability assessments in professional environments. Familiarity should align with one or more of the following areas:
- Assessing systems and networks for configuration weaknesses and policy deviations
- Conducting vulnerability scanning and analysis using automated and manual techniques
- Interpreting scan results to identify risk severity and remediation priorities
- Evaluating defense-in-depth architectures against known vulnerabilities
- Understanding common network protocols, attack vectors, and exposure points
- Supporting vulnerability management processes within enterprise or regulated environments
Minimum Performance Expectation
- Participants must score above 50% on the assessment
- This threshold exists only to confirm practitioner-level participation
- Results are not used for hiring, ranking, or performance evaluation
Ideal Candidate Profile
- Active cybersecurity practitioner (not academic or theoretical)
- Hands-on experience with vulnerability scanning, analysis, and reporting
- Comfortable evaluating real-world scenarios and security tradeoffs
- Reliable and able to complete work within a short, defined window
Deliverables
- One completed skills assessment
- One completed post-assessment survey
Compensation
- Flat-fee contract payment
- Paid upon successful completion of the assessment and survey