(W2 only) Information Security Analyst with Qualys (100% Remote)

Overview

Remote
Depends on Experience
Contract - W2
Contract - 6 Month(s)

Skills

network security
Vulnerbility
Qualys

Job Details

  • (Primary Responsibility) Vulnerability Scanning: Perform passive external vulnerability scans, review results, and communicate recommendations to clients of varying technology complexity.
  • Consultation and Advisory: Provide expert guidance to small business type clients on the implementation and management of comprehensive information security programs in line with firm requirements, specifically pertaining to vulnerability management requirements.
  • Request Management: Effectively manage a large volume of requests, standardize approach, and perform analysis to surface key insights on both daily operations and scan results.
  • Policy Understanding and Implementation: Ensure clients understand and effectively implement information security policies, aligning them with industry standards and regulatory requirements.
  • Collaborate Effectively: Work closely with internal IT and Compliance teams to answer questions on security requirements and clarify or drive changes to policy if improvements are required.
  • Communication: Deliver clear and concise communication, both written and verbal, to effectively convey complex security concepts to clients and stakeholders. Role will heavily involve facilitating discussions with independent branches to consult on security control implementation.
  • Executive Presence: Demonstrate strong executive presence and professionalism in all client interactions, ensuring trust and confidence in advisory services.
  • Issue Escalation: Diagnose and escalate security issues promptly through coordination with internal IT teams.
  • Experience with managed service providers or in implementing and configuring cybesecurity programs of all sizes.
  • Strong communication skills, both written and verbal.
  • Proven ability to work effectively with executive-level clients and stakeholders.
  • Experience with network security technologies such as firewalls, VPNs, IDS/IPS and SIEM.
  • Strong understanding of TCP/IP, DNS, DHCP and other networking concepts.
  • Familarity with penetration testing and vulnerability assessment tools.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.