Experience:
1-3 years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Posted:
8/30/2017
Job Category:
Information Services
See more jobs for students and recent grads who studied:
Vulnerability Management Analyst Expert
Request Technology - Jacqueline White | Northbrook, Illinois
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company
Share

Job Description

Seeking a Vulnerability Expert

Well known company in Northbrook, IL seeking a Vulnerability Expert. If you like a culture where you will stretch your limits and give you exposure to cutting edge technologies, you're in luck. Don't be coy and wait three days to call us. We want to hear from you now! Email your resume to me: (see below)

What our client wants you to do aka responsibilities

Monitoring collection reporting vulnerabilities in Agile within Cloud Solutions.

Threat Intelligence Network Security Incidence Response, Security, Risk Management vulnerability scanning tools.

Quaps - Preferred very large enterprise environment PCI, HIPAA, ISO, NIST, IT Controls.

Who you are

The Vulnerability Management Analyst ensures continuous vulnerability life cycle management within the Company environment including monitoring, collection, reporting, and assessment of impact for vulnerability related data from vendors and internal sources. You must form strong partnerships with technical teams while providing strategy to control vulnerabilities in the environment in a timely manner.

You also meet most (if not all) of the following requirements:

Vulnerability management Subject Matter Expert in Microsoft platform or Open Systems platforms: Linux, UNIX, VM Ware ESX, Java, Adobe, Web Application, Java web app virtualization platforms WebSphere, Networking, Databases including: Oracle, SQL Server, DB2, IMS.
Fully understand/develop enterprise technical standards with specific regards to vulnerability management/configuration.

Bachelor's or Master's Degree with 3-5 years' experience in vulnerability management threat Intelligence, Network Security, Incidence Response, and OR Security Risk Management.
Expert with vulnerability management processes including compliance reporting while having advanced experience with vulnerability scanning tools such as: Qualys

Expert IT security best practices including operating systems: Windows, Unix, Linux, end-user application, and network security
Demonstrate high level experience with Firewalls, Routers, Switches, Load Balancers, etc.
CISSP, GCIH, GPEN certification or completion of certification within 1 year of hire.

Who the Company is

Our client is a large Fortune 500 Enterprise company that we've worked with for over 30+years placing candidates like yourself.

Work with a very talented group of people, where they maintain a friendly environment where people really want to work.

If this sounds great to you, come join us. Please email me your resume to: (see below)

Qualifications

Applicants must be eligible to work in the specified location

This company profile was created by AfterCollege and is about Request Technology - Jacqueline White. This page is not endorsed by or affiliated with Request Technology - Jacqueline White. For questions regarding company profiles, please email: care@aftercollege.com.