Job Title: Cybersecurity Vulnerability Management Lead
Location: Austin, TX, (Remote). may be on-site meeting required at Austin, TX sometimes.
Position Type: Contract
Interview Mode: Both webcam as well as In person interview
- This is remote but may be on-site meeting required at Austin, TX sometimes. Do you agree?
- Onsite in person equipment pick up required on first day of joining at Austin, Tx location. Do you agree?
Key Responsibilities
Vulnerability Inventory and Baseline Establishment
- Review existing vulnerability data from scans, assessments, and security tools
- Establish and maintain a consolidated vulnerability baseline
- Develop and document remediation timelines based on risk posture and aging
Risk Classification and Prioritization
- Categorize and prioritize vulnerabilities based on risk, severity, exploitability, and impact
- Align classification and prioritization with NIST guidance
- Validate remediation timelines against established risk-level expectations
Remediation Coordination and Communication
- Coordinate remediation activities with system, server, and application owners
- Communicate remediation expectations, risk context, and timelines
- Track remediation progress and identify blockers or delays
- Escalate overdue or high-risk vulnerabilities per established processes
Tracking, Metrics, and Reporting
- Maintain ongoing tracking of vulnerability remediation status
- Produce periodic status reports
Validation and Closure
- Validate remediation through scan results or supporting evidence
- Confirm closure of vulnerabilities in tracking systems
- Ensure proper documentation and approval for risk acceptance or exceptions
Program Improvement Support
- Identify process gaps or control weaknesses impacting remediation
- Provide recommendations to improve processes aligned with NIST and governance requirements
II. CANDIDATE SKILLS AND QUALIFICATIONS
|
Minimum Requirements:
Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.
|
|
Years
|
Required/Preferred
|
Experience
|
|
8
|
Required
|
Experience in Vulnerability Inventory and Baseline Establishment
|
|
8
|
Required
|
Experience in Risk Classification and Prioritization
|
|
8
|
Required
|
Experience in tracking vulnerability remediation
|
|
8
|
Required
|
Experience in producing status reports
|
|
8
|
Required
|
Experience in validating remediation actions through available evidence, including vulnerability scan results
|