Job Title:- Vulnerability Threat Management Associate
Location:- Mount Laurel NJ/NYC (Hybrid/3-4 days onsite)
Duration:- 12 months Contract
Responsibilities
Job Description
- Manage the Vulnerability Management program as a leader and subject matter expert from end-to end across VM lifecycle.
- Maintain awareness of new and upcoming vulnerabilities and coordinate across teams to determine the impact.
- Develop Threat Model and proactively and iteratively search through systems and networks to detect advanced threats.
- Influence the development of vulnerability management standards and security policies.
- Recommend and assist with development of new security controls to address findings to include signatures, alerts, workflows, and automation.
- Identify security risks, threats, misconfigurations and vulnerabilities of existing networks, systems, applications and assist in developing solutions to remediate identified threats.
- Analyze identified malicious network and system log activity to determine weaknesses, exploitation methods.
- Establish and drive metrics, analytics, reporting, and a roadmap for continual program improvement through executive summaries and in-depth technical reports.
- Develop and maintain automated situational awareness dashboards for leadership and system owners.
- Assist and support the Cybersecurity Operations Manager in incident handling/investigations.
- Coordinate with the client technology engineering and management teams to resolve the cyber threats and patch the security systems.
Required Qualifications
- Proven experience building, leading and growing a Vulnerability/Threat Management function.
- Solid working knowledge of use scanning and threat detection technologies such as Endpoint Detection and Response, Security Information and Event Management (SIEM), VM scanners, and related security and asset tools.
- Broad, strong technical expertise in network protocols, vulnerability management processes, Windows and Linux based systems, enterprise network security products.
- Ability to analyze architectural documents.
- Experience consuming and analyzing Cyber Threat Intelligence tools.
- Experience working with various technologies and platforms such as AWS, Azure, O365, containers, etc.
- Understanding the current cyber threat landscape, the different tactics commonly used by adversaries and how one would investigate, contain, and recover against their attacks.
- Familiarity with scripting languages such as Python, Ruby, Shell, Bash, Perl are a plus.
Parul Singh
10294 A Baltimore National Park, Ellicott City, MD - 21042 | Ellicott City, MD |
| Email: parul@resourcesys.com