Role Level: Information Security Manager 3
Category: Security
Work Type: Full-Time (Contract)
Location: 100% Remote (U.S. Only)
Contract Duration: May 26, 2026 August 31, 2026 (up to 560 hours) with possible extension
Overview:
Seeking an experienced Information Security Manager 3 to lead vulnerability management and remediation coordination efforts. This role is responsible for overseeing the full lifecycle of vulnerability identification, prioritization, remediation, and reporting, ensuring alignment with NIST standards and agency security policies.
All deliverables will be considered work made for hire and remain the property of TEA. Candidates may be subject to background checks per Texas law.
Key Responsibilities
1. Vulnerability Inventory & Baseline Management
Review existing vulnerability data from scans, assessments, and security tools
Establish and maintain a consolidated vulnerability baseline
Develop and document remediation timelines based on risk and aging
2. Risk Classification & Prioritization
Classify vulnerabilities based on severity, exploitability, and business impact
Align prioritization with NIST guidelines
Ensure remediation timelines meet agency-defined SLAs
3. Remediation Coordination
Collaborate with system, server, and application owners
Communicate remediation expectations, risks, and deadlines
Track progress and identify blockers or dependencies
Escalate critical or overdue vulnerabilities to governance bodies
4. Tracking, Metrics & Reporting
Maintain accurate tracking of remediation activities
Generate regular status reports highlighting progress, risks, and gaps
5. Validation & Closure
Validate remediation through scan results and supporting evidence
Confirm closure in tracking systems
Document exceptions or risk acceptances per policy
6. Program Improvement
Identify gaps or inefficiencies in remediation processes
Recommend improvements aligned with NIST and agency governance
Required Qualifications
Minimum 8 years of experience in:
Vulnerability inventory and baseline management
Risk classification and prioritization
Vulnerability remediation tracking
Status reporting and metrics
Validation of remediation using scan data and evidence
Regards
Tim Patten
tim (at) pullskill (dot) com
551-272-o2o3