Vulnerability Mgr profile- Austin - TX - 12 Months

CISSP, Compliance, risk, Vulnerability Manager, GCIH, CEH
Contract W2, 2
Depends On Experience

Job Description

Vulnerability Manager
12 Months
Phone and webex

Qualifying Experience and Attributes

10 Years experience in IT

Ability to configure and troubleshoot vulnerability scanning systems and the networks on which they run.

Direct experience managing and troubleshooting one or more vulnerability scanning products.

Vendor certifications such as McAfee Product Specialist, Symantec Certified Specialist are desirable.

Other industry certifications such as CISSP, GCIH, CEH, etc. are a plus.

Experience managing vulnerability scanning solutions both on premise and in the cloud.

Strong knowledge of Virtualized or Cloud Computing.

Working knowledge of Windows Active Directory Domains

Working Knowledge of various Linux OS

Strong Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).

Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).

Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge of cybersecurity and privacy principles.

Knowledge of cyber threats and vulnerabilities.

Knowledge of application vulnerabilities.

Skill in conducting application vulnerability assessments.

Skill in performing impact/risk assessments.

Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts.

Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).

Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).

Knowledge of incident response and handling methodologies.

Knowledge of network traffic analysis methods.

Knowledge of new and emerging information technology (IT) and cybersecurity technologies.

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge of key concepts in security management (e.

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Signature implementation impact for viruses, malware, and attacks.

Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge of how to use network analysis tools to identify vulnerabilities.

Skill in using protocol analyzers.

Skill in recognizing and categorizing types of vulnerabilities and associated attacks.

Skill in performing packet-level analysis.

Gurpreet Singh

Technical Recruiter

+1 732-313-2048

Posted By

Gurpreet Singh

Dice Id : 10423087
Position Id : 2020-2687
Originally Posted : 1 month ago
Have a Job? Post it

Similar Positions

Business Analyst
  • New Age Technologies Inc
  • Louisville, KY
L3 Incident Response Analyst
  • Apex Systems
  • Round Rock, TX
Cybersecurity Manager
  • Home Depot Inc
  • Austin, TX
Principal Security Engineer
  • Bravo Technical Resources
  • Austin, TX
Cyber Threat Intelligence Analyst
  • Leidos
  • Fort Worth, TX
Technical Principal for Insider Threat
  • Charles Schwab & Co., Inc.
  • Westlake, TX
Manager, Cybersecurity Engineer
  • Tenet Health
  • Dallas, TX
Cyber Services Delivery
  • Louisiana Economic Development
  • Bossier City, LA