Cybersecurity Vulnerability Management Specialist

New York, NY, US • Posted 1 hour ago • Updated 1 hour ago
Contract W2
Contract Corp To Corp
On-site
Depends on Experience
Fitment

Dice Job Match Score™

🔗 Matching skills to job...

Job Details

Skills

  • Vulnerability Management Specialist
  • Vulnerability
  • Penetration Tester
  • Cybersecurity
  • vulnerability assessment
  • remediation
  • CVE
  • Tanium
  • Qualys
  • Nessus
  • Rapid7
  • SecurityScorecard
  • Security Scorecard
  • OWASP
  • NIST
  • MITRE
  • Windows
  • Linux
  • Active Directory
  • QWS
  • Azure
  • Python
  • PowerShell
  • Bash

Summary

DIRECT CLIENT REQUIREMENT

Job Title: Cybersecurity Vulnerability Management Specialist

Duration: 12+ months

Location: NYC, NY or Mesa, AZ

Hybrid position (2 3 days per week onsite).

Summary

The Red Team Specialist will join Client s cybersecurity team with a primary focus on vulnerability management across the enterprise. The role is responsible for interpreting penetration test reports (largely produced by third-party vendors), driving remediation across system owners, validating fixes, and reporting on the organization s overall vulnerability posture. A working understanding of penetration testing is required so the candidate can credibly translate findings into actionable remediation work, and a limited amount of internal hands-on testing may also fall under this role.

Key Responsibilities

  • Vulnerability Management (Primary Focus)
  • Own the end-to-end vulnerability management lifecycle: discovery, triage, prioritization, assignment, remediation tracking, and validation.
  • Read, interpret, and operationalize penetration test reports delivered by third-party vendors translating findings into clear, actionable remediation tasks for system owners, developers, and infrastructure teams.
  • Build and maintain vulnerability dashboards and reports, including CVE tracking, aging analysis, and trend reporting for technical and executive audiences.
  • Use Tanium for vulnerability identification, patch management, and reporting (preferred; training available for the right candidate).
  • Partner with patch management, infrastructure, and application teams to ensure timely remediation aligned with risk severity.
  • Provide guidance on vulnerabilities using a risk-based approach considering ease of exploitation, exposure, and business impact.
  • Validate remediation efforts and confirm vulnerabilities have been effectively closed.
  • Identify opportunities for improvement in tools such as SecurityScorecard and similar external risk-rating platforms.

Third-Party Penetration Test Coordination

  • Manage relationships with third-party penetration testing vendors, including scoping, scheduling, and execution oversight.
  • Apply Client s internal penetration testing framework across the application onboarding lifecycle.
  • Manage deliverables from external testers; review findings, ensure supporting evidence is sufficient, and defend or challenge findings as appropriate.
  • Track and report on third-party testing engagements, including risk, mitigation strategies, and references.

Limited Internal Penetration Testing

  • Note: Internal hands-on testing will be minimal. The candidate should be capable of supporting it but will not perform deep offensive operations day-to-day.
  • Conduct light-touch internal penetration tests and vulnerability assessments of servers, web applications, and databases as needed.
  • Provide spot-checking and validation of existing technical security controls.
  • Communicate technical findings and remediation steps with developers, system administrators, project managers, and senior stakeholders.

Purple Teaming & Incident Response Support

  • Support purple team exercises that bring collaboration between Security, Operations, and Business Units to validate technical controls and remediation effectiveness.
  • Participate in incident response activities, including tabletop exercises and major incident remediation.
  • Provide guidance to the security operations team on adversary techniques and procedures (TTPs) to improve awareness and response times.

Required Experience & Skills

  • 2+ years of experience in cybersecurity, with a working knowledge of penetration testing concepts and the ability to read, interpret, and act on penetration test reports.
  • Hands-on experience managing a vulnerability management program prioritization, remediation tracking, and reporting.
  • Familiarity with web application, infrastructure, and basic cloud (AWS and/or Azure) vulnerability concepts.
  • Working knowledge of Windows/Active Directory and Linux systems administration and common vulnerabilities.
  • Familiarity with OWASP Top Ten, NIST, and MITRE ATT&CK frameworks.
  • Working proficiency in at least one scripting language: Bash, PowerShell, or Python.
  • Strong written and verbal communication skills able to clearly articulate technical findings and remediation requirements to mixed audiences (engineers through senior stakeholders).
  • Demonstrated ability to drive remediation across cross-functional teams.

Certifications (Any of the Following Are a Plus)

  • Practical/offensive: OSCP, eCPTX, eCPPX, PNPT, GPEN, eCXD, CEH, PenTest+
  • Defensive: BTL1, BTL2
  • Cloud security: AWS Certified Security Specialty or Azure equivalent

Preferred (Strong Pluses, Not Required)

  • Tanium experience: Building reports, tracking CVEs, and supporting vulnerability and patching workflows. Client is a Tanium reseller and uses Tanium heavily this is a significant plus.
  • CrowdStrike experience: Hands-on familiarity with CrowdStrike Falcon (EDR) is a strong plus.
  • Exposure to penetration testing or red teaming engagements (web apps, APIs, network devices, databases, OS, cloud).
  • Experience with NIST 800-53 and the Risk Management Framework (RMF).
  • 1+ years of SOC and/or incident response experience, with a focus on host data acquisition and threat hunting.
  • Familiarity with penetration testing toolsets (Burp Suite, NessQualys, Kali Linux, Metasploit, Cobalt Strike) at a level sufficient to interpret vendor outputs.
  • Bachelor s degree in computer science, Engineering, Information Systems, or related field.

Please submit the following in the notes section when you submit the resume

Submission format for all resumes:

Full Name of the candidate:

Work Authorization:

Availability:

Rate: $/hr all-inclusive without Benefits

Current location:

Contact:

Email:

LinkedIn URL:

Reason for Job Change:

Project End date:

Regards,

Kapil Thapa
Sr. Manager US IT Recruitment

SVAM International | 233 East Shore Road | Suite # 201,Great Neck, NY 11023

Cell: ext 108| Fax: | Email: |

CMMI Level 5 | ISO 9001:2008 |ISO 27001:2013 Company | LISA Award winner

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: svam
  • Position Id: 8965632
  • Posted 1 hour ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Hybrid in New York, New York

Today

Easy Apply

Contract, Third Party

$70 - $75

New York, New York

Today

Easy Apply

Third Party, Contract

50 - 55

Remote or Hybrid in New York, New York

Today

Easy Apply

Contract

$60,000 - $65,000

New York, New York

Today

Contract

USD 80.00 - 90.00 per hour

Search all similar jobs