Match score not available

Vulnerability Management Analyst II

extra holidays - extra parental leave
Remote: 
Full Remote
Contract: 

Offer summary

Qualifications:

Bachelor’s degree in Information Systems, Computer Science, Cybersecurity, or related field., Preferred certifications include GEVA, CEH, CISSP, GPEN, GXPN, OSCP, Security +, and/or PenTest +., In-depth knowledge of Microsoft platforms, Linux distros, networking concepts, and databases is required., Ten years of experience in information security and vulnerability scanning tools is essential..

Key responsabilities:

  • Oversee and coordinate the vulnerability management process, including performing vulnerability scans on all systems.
  • Collaborate with System Owners and IT Managers to identify and resolve vulnerabilities in a timely manner.
  • Generate and communicate reports on patching status and escalate unresolved vulnerabilities as necessary.
  • Review and document requests for exceptions to scanning and manage the approval process for those exceptions.

America First Credit Union logo
America First Credit Union Financial Services Large https://www.americafirst.com/
1001 - 5000 Employees
See all jobs

Job description

Overview:

Oversees and coordinates the vulnerability management process.  Performs vulnerability scans on all systems that connect to the Credit Union’s network.  Works closely with the necessary business, system, and IT owners responsible for protecting the assets of the Credit Union to resolve vulnerabilities in a timely manner.  Provides real-time reports on the status of patching of all systems connected to the Credit Union’s network.  Escalates unresolved vulnerabilities to the appropriate level of management based on risk and responsiveness.  Helps identify false positives and remove them from regular scans.  Sets up authenticated scanning wherever possible on systems.  Evaluates requested exceptions based on risk and makes recommendations for appropriate exclusion from scanning.  Oversees the review of exceptions on a periodic basis.

Responsibilities:
  1. Vulnerability Scanning

    • Partners with System Owners, Server Admins, and IT Managers in identifying vulnerabilities on their systems primarily through the use of vulnerability management software.
    • Ensures that the Vulnerability Management software is scanning all available hosts on AFCU’s network.
    • Ensures that all scans are completed as scheduled following a risk-based approach for type and frequency of scans.
    • Sets up authenticated scans as often as possible.
    • Works with the Asset Tracking Admin to ensure each host on the network with a vulnerability has an owner.
    • Follows up on any incomplete scans.
    • Troubleshoots and fixes problems related to vulnerability scans.
    • Partners with System Owners and Server Admins with the verification of false positives and adjusts the vulnerability management software scans to omit those.
    • Updates the vulnerability management standards as needed to align with industry best practices.

 

  1. Monitoring
    • Runs regular reports to determine AFCU’s status in their patching efforts and communicates those findings to the appropriate personnel. For example…
      • Uses outstanding patch trending reports to monitor for anomalies in the vulnerability management effort.
      • Follows up with the appropriate personnel when anomalies are detected; documents the reason for the anomalies and facilitates their resolution.
      • Reports outstanding patch trending reports to Security Engineering Department Manager, System Owners, Server Admins, and IT Managers on a regular basis to keep them informed on patching status.
      • Escalates vulnerabilities that are not resolved in a timely manner as per AFCU’s vulnerability management standard.

 

  1. Managing Exceptions
    • Carefully reviews and documents requests for exceptions to the vulnerability management software scans and obtain the necessary approvals for exceptions as per the vulnerability management standard.
    • Updates the vulnerability management software to omit approved exceptions for the regular scans.
    • Periodically reviews exceptions as per the vulnerability management standard.

 

  1. Responsible for related duties as required or assigned.
    • Creates other means for measuring, monitoring, and controlling vulnerabilities and the patching of those vulnerabilities, such as identifies Key Performance (KPI) & Key Risk Indicators (KRIs).
    • Completes special projects as assigned.
    • Assists with security assessments of credit union systems.
    • Assists with the security assessment of various software purchases, external vendors and technology service providers.
    • Supports other IT Department and Security Engineering Department staff as needed.
    • Performs ad-hoc scans as needed.
  1. Mentor Vulnerability Assessment Analysts I
Qualifications:

Training/Education/Certification:

  • Bachelor’s degree in Information Systems, Computer Science, Cybersecurity, or related field.
  • Two of the following preferred: GEVA, CEH, CISSP, GPEN, GXPN, OSCP, Security +, and/or PenTest +.

 

Required Knowledge:

  • In-Depth, working knowledge of Microsoft platform (e.g.; Server, Workstation), multiple Linux distros, virtual machines, Java, Adobe, Web Applications, WebSphere, networking concepts (Firewalls, Switches, Load Balancers), and Databases (e.g.; Oracle, SQL Server, DB2, etc.).
  • In-Depth, working knowledge of IT security/hardening best practices; including but not limited to operating systems (e.g., Windows, Linux), virtual machines, web applications, network devices, and databases.
  • In-Depth ,working knowledge of industry standard security best practices and vulnerability management processes.
  • In-Depth , working knowledge of scripting languages (python, perl, etc.) and/or programming languages (java, .net, etc.) preferred.
  • In-Depth, working knowledge of security standards such as NIST, FFIEC, CIS, PCI, and other control frameworks.

 

 Experience Required:

  • Ten years using vulnerability scanning tools (Qualys preferred).
  • Ten years in information security.
  • Ten years in information technology.

 

Skills/Abilities:

  • Champion for vulnerability management and information security, including broadening awareness and education of security best practices.
  • Strong analytical and problem-solving skills.
  • Strong curiosity, initiative, willingness to experiment, and persistence in providing solutions to tough technical challenges.
  • Well organized with good verbal and written communications skills.
  • Ability to prioritize and plan projects effectively.
  • Ability to assist others and share knowledge with other team members.
  • Ability to work effectively with cross-functional teams.
  • Able to use PC, terminal keyboards, and various computer hardware.
  • Self-directed and works with minimal guidance.

Required profile

Experience

Industry :
Financial Services
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Teamwork
  • Communication
  • Problem Solving

Related jobs