WHY THIS ROLE IS IMPORTANT:
- Provide vulnerability remediation support for device owners
- Adhoc scanning for remediation verification
- Vulnerability details
- Solution details
- Analyze current reports and metrics to identify devices needing remediation focus
- Utilizes vulnerability system and application scanning tools (inclusive of multiple resource types: servers, containers, databases, IOT, etc….)
- Validates outputs from automated vulnerability assessments to reduce false positives and update those tools to prevent reoccurrence
- Operational reporting of scan operations
- Participate in vulnerability management groups providing in-depth knowledge of emerging/trending threats
- Assist with current projects as needed
THE BACKGROUND THAT FITS:
- Bachelor's degree in information security, computer science, engineering, or equivalent experience
- Minimum 3 years of related experience in Information Security performing any of the following: vulnerability assessment, vulnerability scanning, database vulnerabilities, data at rest, networking, baseline compliance management.
- Minimum 3 years of technical and/or operational experience implementing technology that enables business processes
- Experience with infrastructure vulnerability assessment tools (ie. Nexpose, Twistlock, and others)
- Understanding of current threats and exploits to include experience with threat remediation
- Understanding of operating systems and infrastructure security configuration