Mobile Device Vulnerability Management & Configuration Compliance Engineer

New York, NY, US • Posted 1 day ago • Updated 1 day ago
Contract W2
On-site
Depends on Experience
Company Branding Image
Fitment

Dice Job Match Score™

📋 Comparing job requirements...

Job Details

Skills

  • Mobile OS security fundamentals
  • Vulnerability management expertise
  • Configuration compliance
  • Mobility Scanning Tool Experience
  • MDM experience
  • mobile/UEM security
  • vulnerability management
  • compliance engineering

Summary

Job title - Mobile Device Vulnerability Management & Configuration Compliance Engineer


Work location New York, NY, Onsite

Contract duration 12 months

Minimum years of experience needed in the required skills: 5 years of experience
Minimum overall work experience required - 5 years
Domain Cyber Security: Application Security

Job Description
The Mobile Device Vulnerability Management & Configuration Compliance Engineer will partner with internal stakeholders to design, validate, and operationalize an automated mobile device vulnerability scanning and configuration compliance capability across enterprise-issued mobile endpoints (iOS/iPadOS and Android). This role leads proof-of-technology (PoT) activities including tool evaluation, architecture validation, security controls mapping, and pilot execution, and drives full-scale implementation through integration with other security tools such as MDM, SIEM/SOAR, ITSM, and asset inventory/CMDB systems. The engineer will establish and maintain mobile vulnerability management processes aligned to corporate and regulatory requirements, develop continuous compliance and policy enforcement strategies, implement risk-based remediation workflows, and deliver measurable improvements in mobile endpoint security posture.

Key Responsibilities
Define PoT scope, success criteria, and test plans for automated mobile vulnerability scanning (e.g., agent-based/agentless, MDM-integrated, API-driven).
Evaluate candidate tools for: coverage (OS/app/cert/profile), detection accuracy, scalability, device impact, privacy controls, and reporting fidelity.
Execute pilots across representative device populations validating:
o vulnerability detection capabilities (OS versions, CVEs, patch levels, risky apps)
o configuration compliance checks (encryption, jailbreak/root, screen lock, OS hardening)
o integration readiness (Intune/Workspace ONE/Jamf; SIEM; ITSM; CMDB)
Produce PoT outcomes: findings, risk analysis, cost/benefit, architecture decision record, and go/no-go recommendation.
Coordinate with InfoSec and Compliance teams to ensure SaaS platform posture aligns with regulatory requirements (NYDFS).
Build and run mobile vulnerability lifecycle processes: discovery, assessment, prioritization, remediation, validation, reporting.
Establish severity/risk scoring tuned for mobile (exposure, device role, app risk, compliance impact).
Coordinate remediation with endpoint engineering, mobility admins, app owners, and operations teams.
Validate remediation effectiveness using scanner re-runs, policy compliance, and audit evidence.
Develop, deploy, and continuously improve baseline security configurations for iOS/iPadOS and Android.
Translate requirements into enforceable policies (password/biometrics, encryption, OS update controls, app controls, certificate/profile constraints, VPN/Wi-Fi security, logging settings).
Implement compliance monitoring and drift detection; drive automated or semi-automated corrective actions.
Build automation scripts and APIs to normalize and enrich findings.
Support change management and communications for new controls impacting device behavior and user experience.
Provide technical guidance and training to operations teams for ongoing support.

Required Skills
Mobile OS security fundamentals: iOS/iPadOS and Android security models, patching, permissions, app ecosystems, jailbreak/root detection concepts.
Vulnerability management expertise: CVE/patch lifecycle, risk-based prioritization, SLAs, validation, metrics.
Configuration compliance: baseline hardening, policy enforcement, continuous compliance monitoring, and drift remediation.
Mobility Scanning Tool Experience (hands-on): Qualys Mobile VMDR, Lookout, Workspace One + Microsoft Threat Defense, or equivalent.
MDM experience (hands-on): Microsoft Intune, Omnissa Workspace ONE, Jamf Pro, or equivalent.
Enterprise integration skills: API integration, data normalization, and automation with SIEM/SOAR/ITSM (e.g., Splunk, Sentinel, QRadar; XSOAR, Sentinel SOAR; ServiceNow).
Identity & access: conditional access concepts, device compliance states, SSO, certificates, MFA, posture-based access controls.
Scripting/automation: PowerShell and/or Python; familiarity with REST APIs, JSON, OAuth, and secrets management.
Security documentation: ability to author PoT plans, architecture diagrams, operational runbooks, and audit evidence.
Excellent documentation and stakeholder management skills.
Strong analytical and problem-solving skills.
Excellent communication and stakeholder management skills; experience presenting PoT results and recommendations.
Ability to work independently and across multifunctional teams.
Detail-oriented with a focus on process improvement and operational excellence.
Ability to manage multiple workstreams (pilot + integration + operations) with minimal supervision.
Familiarity with NIST, CIS Benchmarks, DISA STIG (mobile), ISO 27001 control mapping, or similar frameworks.

Educational Requirements
Bachelor s degree in Cybersecurity, Information Systems, Computer Science, Engineering, or equivalent practical experience.

Relevant Certifications
CompTIA Security+, CySA+
GIAC: GSEC, GMON, or related (if available/appropriate)
Qualys/Rapid7/Tenable (or equivalent vulnerability platform certifications where relevant)
Governance / Risk / Architecture (bonus)
CISSP, CISM, CCSP
ITIL Foundation (for ITSM integration and operations maturity)

Experience Level
5 8+ years in cybersecurity/endpoint security, with 2 4+ years specifically in mobile/UEM security, vulnerability management, or compliance engineering

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 90901966
  • Position Id: 118830
  • Posted 1 day ago

Company Info

About Epic Systems, Inc,

Epic Systems, Inc (a.k.a. EPIC) has been incorporated in the state of Virginia. EPIC provides highest degree of satisfaction in providing the services for clients IT organizations since 2005. EPIC provides IT Consulting services throughout in the United States with various federal agencies and as well as commercial clients.

EPIC has been awarded as Small, Women-owned, and Minority-owned Business (SWaM) certified company in 2013 and has been received 8(a) small business certification from U.S Small Business Administration (SBA.gov)

Our IT professionals are committed to providing high-end reliable IT consulting services .Our consultants are highly skilled in the latest technology, and whether we work onsite at your office or we handle your needs remotely, you can be assured of reduced costs, increased productivity, and a greater return on your IT investment.

We work closely with customers to understand their goals and requirements. With a clear understanding of customer objectives and management goals, we develop the proper solutions for our customer organization.

We specializes in providing advanced technology solutions focused on information systems, enterprise solutions, custom web development and systems integration. We are here to solve client's IT challenges in various areas such as Enterprise Application Development, Application Integration and also Developing custom applications based on JAVA/J2EE/.NET. EPIC provide services to our clients using COTS (Commercial Off-The-Shelf) based products such as TIBCO SOA, Oracle OSB, and SAP areas. We also specialized in developing web development for clients that are needed to custom their web sites.

We provide lifecycle services that align your IT systems with your business processes so your organization can perform at its best from planning, development, and integration to security, management, and support.

About_Company_OneAbout_Company_Two
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

New York, New York

Yesterday

Easy Apply

Contract, Third Party

$70 - $75

Hybrid in Jersey City, New Jersey

Today

Easy Apply

Contract

60 - 70

Hybrid in Brooklyn, New York

Today

Easy Apply

Contract, Third Party

Depends on Experience

Brooklyn, New York

4d ago

Easy Apply

Contract

Depends on Experience

Search all similar jobs