About the Role
Essential Duties and Responsibilities
Perform comprehensive vulnerability assessments and continuous monitoring across the organization.
Manage the entire lifecycle of vulnerabilities from discovery, triage, advising, remediation, and validation.
Work with various different business units to perform vulnerability assessments on systems or applications before go live rollouts.
Triage patch Tuesday releases and make recommendations on required remediations.
Examine systems and applications to assess the current security posture.
Manage vulnerability related tickets to ensure issues are remediated within proper timelines.
We are currently open to candidates that are based Remotely in the United States.
What You’ll Need
4+ years of professional experience working within a Vulnerability Management role.
Advanced knowledge of Server and client operating systems.
Extensive experience with core vulnerability management scanners (e.g. Tenable, Rapid7, Qualys, etc.).
Extensive experience with web application scanners (e.g. WebInspect, Accunetix, Burp, etc.).
Ability to prioritize impactful vulnerabilities and reduce noise often associated with vulnerability tools.
Experience working with Mac, Windows, Linux and/or other Unix-like variants.
Thorough understanding of TCP, UDP, HTTP, IP and other network protocols.
Understanding of how to triage vulnerabilities and validate tool findings before reporting them or taking action.
Possess the ability to work independently.
Proactive go getter attitude to solve challenging problems.
Stays up to date with current vulnerabilities and vulnerability related news in various industries.
Ability to automate and script tasks using your preferred programming language (e.g. GoLang, Python, Ruby, Perl, BASH)
Ability to utilize and write scripts against common web APIs (REST, SOAP).
Knowledge of cloud platforms and highly concurrent systems.
Experience in regulated environments (FedRAMP, SOC 2, etc)
Experience working in a dynamic cloud environment
Knowledge of container technology and how to assess the security posture of images
You’re a clear thinker and efficient communicator (i.e written and verbal).
Technical security certifications or academic background a plus.