VULNERABILITY MANAGEMENT ANALYST

Overview

Hybrid
Depends on Experience
Accepts corp to corp applications
Contract - W2
Contract - Independent
Contract - 12 Month(s)
No Travel Required

Skills

Linux
Nessus
Nexpose
Qualys
attention to detailStrong
business acumen
business process
customer
customer service skills
customers
keyboard
keyboarding
organizational skills
planning
quantitative analysis
team player
threat intelligence
typing
vulnerability
written communication

Job Details

3Core Systems, Inc is an SAP and Success Factors Partner with employees located across the United States. Our organization is dedicated to customer and employee satisfaction. We provide High Quality, Cost efficient and Competitive Solutions and Resources.

3Core Systems is looking for VULNERABILITY MANAGEMENT ANALYST for one of our clients in Dallas, TX / Miramar, FL (Hybrid 3/2)

Role: VULNERABILITY MANAGEMENT ANALYST

Location: Dallas, TX / Miramar, FL (Hybrid 3/2)
Duration: 12 Months

Skill Set required:

Vulnerability Management for Enterprise and OT (operational technology) environments.

Vulnerability management is defined as the business process of identifying, prioritizing, remediating, and reporting on software insecurities and misconfigurations of endpoints in Operating Technology (OT)

Overview

The Senior Analyst, OT Vulnerability Management is responsible for evaluating, rating, and performing vulnerability assessments on assets within operational technology (OT) environments. Responsibilities include conducting vulnerability assessments, analyzing risks, and working closely with cross-functional teams to implement strategies for patch management to mitigate vulnerabilities. The ideal candidate will be a strong leader of people with exceptional understanding and subject matter expertise in OT vulnerability management strategies.

They will manage Enterprise and OT-specific vulnerability scanners, as well as create and present meaningful reports to assist teams responsible for addressing vulnerabilities.

Responsibilities

  • Lead regular vulnerability assessments of OT systems, networks, and devices to identify risks to the business
  • Develop information security policies, standards, and procedures for the OT Vulnerability Management program
  • Coordinate with teams and business partners regarding OT Vulnerability Management best practices for on premise and cloud-based solutions
  • Manage and monitor newly announced vulnerabilities and CVEs specific to OT environments
  • Integrate threat intelligence into vulnerability management processes to proactively address security risks
  • Serve as the OT Vulnerability Management expert and trusted advisor
  • Address vulnerabilities quickly and efficiently while ensuring little to no impact to the business
  • Develop strategies for the deployment of security patches, updates, and configurations to mitigate identified vulnerabilities
  • Develop and maintain OT-specific incident response plans that define detection, analyzing, and respond to security incidents with OT-environments and their systems
  • Coordinate with other incident response teams
  • Work closely with internal teams and OT vendors to assess and address security risks on OT systems
  • Assist with Enterprise vulnerability management

Minimum Qualifications

  • Bachelor's Degree
  • 7 or more years of work experience in IT
  • 5 or more years of experience in OT vulnerability management
  • Ability to create and influence a Vulnerability Management program at the enterprise level
  • Relevant industry experience with a technical background
  • Excellent understanding of Windows and Linux operating systems
  • Experience with Vulnerability Management methodology
  • Deep understanding of OT environments mandatory
  • Ability to work with third-party vendors to ensure vulnerabilities are addressed in their applications and/or systems
  • Must understand all aspects of an OT environment to include networking, systems, and applications
  • Continually follow the threat landscape to stay on top of the latest OT-related vulnerabilities
  • Work effectively with technical and non-technical partners in a cross-functional setting
  • Effective team player with technical and non-technical personnel in a cross-functional setting
  • Work closely with the Security Operations team in performing Purple Teaming exercises
  • Must be willing to perform OT environment activities in specified time windows that may include after-hours
  • Strong balance of business acumen and technology knowledge
  • Excellent verbal/written communication skills
  • Self-starter and motivated with deep attention to detail
  • Strong team player who can work across multiple functions and lead peers, excellent listener and collaborator who partners closely with others
  • Establish and communicate clear priorities and sense of direction
  • Express ideas in a clear, fluent, and concise manner to both technical, and non-technical audiences
  • Must possess a pentesting certification such as OSCP, GPEN, CRTP, CWAPT, etc.
  • Act as a mentor to other members of the team
  • Critical thinker, Influencer, Facilitator, Problem solver
  • Results-oriented, Strategic Thinker
  • Good quantitative analysis skills
  • Excellent customer service skills in all interactions with internal and external customers, including but not limited to partners from other divisions, vendors, suppliers, across all areas of the business
  • Strong planning and organizational skills to work in a fast-paced environment and manage multiple priorities

Preferred Qualifications

  • Master's Degree
  • Active CISSP or other related certifications

Specialized Skills and Technologies

  • Excellent Vulnerability Management skill set
  • In-depth knowledge of OT-specific and Enterprise vulnerability scanners
  • Able to assess a vulnerability without scanners if needed
  • Able to perform OT assessments
  • 3 or more years of experience with utilizing, and managing, an Enterprise vulnerability scanner such as Nessus, Nexpose, Qualys, etc.
  • 5 or more years of experience with utilizing and managing an OT-specific vulnerability scanner

Physical Demands

  • Physical demands with activity or condition for a considerable amount of time include sitting and typing/keyboarding using a computer (e.g., keyboard, mouse, and monitor) or adding machine
  • Physical demands with activity or condition may include occasional to rare amount of time include walking, bending, reaching, standing, and stooping
  • May require occasional lifting/lowering, pushing, carrying, or pulling up to 20lbs

Venu

Ph: (630) (971) (5271)

Regards,

Recruiting Team

3Core Systems Inc

9101 Burnet Road, Suite 207, Austin, TX 78758

URL:

3Core Systems, Inc

Web: