Contract Subject Matter Expert (SME) – Vulnerability Assessment Analyst
Remote Worker - N/A
Job Type
Contract
Description

This role is designed for experienced cybersecurity practitioners to participate in a skills assessment pilot aligned to the Vulnerability Assessment Analyst (Work Role 541). The purpose of this engagement is assessment validation and standard-setting, not hiring, ranking, or performance evaluation.

The Contract SME will complete a structured assessment and a brief survey only. This role does not include teaching, instructional design, content creation, consulting, or advisory responsibilities.


Scope of Work

  • Complete a practitioner-level skills assessment
  • Complete a short post-assessment survey
  • No meetings, facilitation, reviews, or follow-up work

This is a finite, transactional engagement with clearly defined deliverables.


Time Commitment

  • Estimated assessment length: ~120 items
  • Estimated completion time: Approximately 1 hour
  • Assessment window: Must be completed within a defined access period (typically 5 business days once access is granted)
  • Once started, the assessment must be completed within 24 hours
Requirements

Candidates must be current practitioners with applied, real-world experience performing vulnerability assessments in professional environments. Familiarity should align with one or more of the following areas:

  • Assessing systems and networks for configuration weaknesses and policy deviations
  • Conducting vulnerability scanning and analysis using automated and manual techniques
  • Interpreting scan results to identify risk severity and remediation priorities
  • Evaluating defense-in-depth architectures against known vulnerabilities
  • Understanding common network protocols, attack vectors, and exposure points
  • Supporting vulnerability management processes within enterprise or regulated environments

Minimum Performance Expectation

  • Participants must score above 50% on the assessment
  • This threshold exists only to confirm practitioner-level participation
  • Results are not used for hiring, ranking, or performance evaluation

Ideal Candidate Profile

  • Active cybersecurity practitioner (not academic or theoretical)
  • Hands-on experience with vulnerability scanning, analysis, and reporting
  • Comfortable evaluating real-world scenarios and security tradeoffs
  • Reliable and able to complete work within a short, defined window

Deliverables

  • One completed skills assessment
  • One completed post-assessment survey

Compensation

  • Flat-fee contract payment
  • Paid upon successful completion of the assessment and survey