Experience:
1-3 years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Posted:
9/7/2017
Job Category:
Information Services
See more jobs for students and recent grads who studied:
Vulnerability Management Analyst
Request Technology - Anthony Honquest | Northbrook, Illinois
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company
Share

Job Description

Vulnerability Management Analyst

Northbrook, IL

Prestigious Organization is seeking a Vulnerability Management Analyst who will ensure continuous vulnerability life cycle management within the Company environment including monitoring, collection, reporting, and assessment of impact for vulnerability related data from vendors and internal sources. This candidate must form strong partnerships with technical teams and provide strategy and prioritization to control vulnerabilities in the environment in a timely and effective manner.

Responsibilities

Perform as a vulnerability management SME in one or more of the following areas: Microsoft platform (Server, Workstation, applications), Open Systems platforms (Linux, UNIX, VM Ware ESX), Java, Adobe, Web Application, Java web app virtualization platforms (eg WebSphere), Networking, Databases (Oracle, SQL Server, DB2, IMS), and others.

Have the ability to understand and develop enterprise policy and technical standards with specific regard to vulnerability management and secure configuration.
Be able to successfully partner with other security and IT professionals to assess potential impact from vulnerabilities specific to Company's environment, and determine and implement mitigating controls.
Identify and recommend appropriate measures to manage and remediate vulnerabilities and reduce potential impacts on information resources to a level acceptable to the senior management of the company.
Build strong partnerships with technical teams to promote best practices for managing vulnerabilities in an agile manner and within cloud solutions.
Ability to fully understand business requirements and work with them to define appropriate solutions security objectives while meeting the business need.
Be a champion for vulnerability management and information security including broadening awareness and use of the team's services, education of security best practices and integration with other business areas.
Providing mentorship and support to teammates with regard to vulnerability assessment, communication/rapport with other divisions and various levels of leadership, technical expertise, and career development.
Develop and improve KPIs, metrics, and trending for vulnerability management functions.
Participate and lead new projects as needed.
Other duties as assigned.

Job Qualifications

Bachelors and/or Masters Degree or equivalent experience in Information Security, Engineering, Computers Science, or related field
3-5+ years experience in either vulnerability management or related information security field (Threat Intelligence, Network Security, Incidence Response, Security Risk Management)
Familiar with industry standard security best practices and vulnerability management processes including compliance reporting
Advanced experience with vulnerability scanning tools (Qualys preferred) and other vulnerability management tools.
Demonstrate knowledge of IT security best practices including operating systems(Windows, Unix, Linux), end-user application, and network security
Demonstrate knowledge of networking concepts and devices (Firewalls, Routers, Switches, Load Balancers, etc)
Excellent analytical and problem solving skills
Demonstrated ability to participate in cross functional teams, including offsite, remote and offshore resources
Experience working in very large enterprise environment with diverse teams.
Effective written, verbal communication skills. Ability to tailor communication style to audience at hand
Ability to effectively communicate with technical and non-technical resources
Strong organizational skills
Self-directed, works with minimal guidance, and recognizes when guidance needed
Demonstrated ability to stay abreast securing evolving technology such as cloud and mobile computing.
Knowledge of PCI, HIPAA, ISO, NIST, and IT Controls
CISSP, GCIH, GPEN, or other industry certification or expected completion of certification within 1 year of hire.

Qualifications

Applicants must be eligible to work in the specified location

This company profile was created by AfterCollege and is about Request Technology - Anthony Honquest. This page is not endorsed by or affiliated with Request Technology - Anthony Honquest. For questions regarding company profiles, please email: care@aftercollege.com.