Remote or Austin, Texas
•
Today
Vulnerability Inventory and Baseline Establishment 1. Review the Agency s existing vulnerability data, including vulnerabilities identified through scanning, assessments, or other security tools. 2. Establish and maintain a consolidated vulnerability baseline. 3. Develop and document a remediation timeline for all identified vulnerabilities, reflecting current risk posture and aging. Risk Classification and Prioritization 1. Ensure that vulnerabilities are categorized and prioritized based on
Easy Apply
Full-time, Part-time, Third Party, Contract


