Vulnerability Management Engineer
IT | Dallas, TX | Contract
On behalf of our client, we are looking for a Vulnerability Management Engineer who will be responsible for managing threats and vulnerabilities in target systems, networks, and applications at an enterprise level. This role is also responsible for partnering with the managed security services partner in the operation and maintenance of information security systems. The ideal candidates will be able to work effectively in a fast-paced setting, bring a fresh perspective to the Security program and be passionate about protecting, defending, and responding to information security-related events.
This role does not require to be on-site.
This is a 3-month contract, likely to be extended or converted to full-time
List the essential functions and activities in order of their importance.
Vulnerability assessment and remediation management
SOC operations technologies, incident response processes, and visualization platforms
Infrastructure & cloud security architecture and engineering; endpoint security; data security; and IAM best practices
Supporting cyber initiatives aligning with NIST CSF framework and risk assessments
Maintain and optimize cyber tools; update processes, documentation, and reporting; security policies, standards, and procedures
Cybersecurity technologies and take ownership of security control design; and delivery of projects
Must have demonstrated experience in collaboration, teamwork, and problem-solving to achieve goals
Ability to effectively multitask, prioritize and execute tasks
3-5 years in a vulnerability management engineering role or relevant background
Experience operating in a production cloud environment, with expertise in at least one area: server, network, cloud or database
Experience tuning, improving, and devising efficient scanning workflows
Experience communicating and collaborating within an engineering organization to report on and correct vulnerabilities
Experience with log or data analysis, extracting salient data points to determine an event’s impact and root cause
Broad exposure to many security disciplines and deeper understanding of models and principles behind core security concepts