About The Position

Vulnerability Operations Ensure business and technology remain within risk tolerance for all applicable Cybersecurity risk appetites and sustain it with the consistent operating model. Enhance current vulnerability management (VTM) operating model in line with BFT Risk Governance organization with Path-to-appetite and reporting. Timely escalate to CISO Leadership and Businesses and ensure VTM risk treatment responses are entered in a timely fashion Support Vulnerability Organization to improve the quality and integrity of VTM/GEM reports Continue supporting vulnerability management Uplift Program activities and reduce risk while reducing stakeholders' pain-points (data/reporting, false positives, processes). Perform root cause analysis of VA Issues and identification of repeated offenders for high risk vulnerabilities Work with SIM and ISO community to facilitate the adherence of SIRT reporting timelines as per defined within SIRT standard, as well as identify deviations and its cause

Requirements

  • 5+ years of relevant experience
  • Possesses deep and broad technical expertise across multiple security domains and security controls (e.g., threat intelligence, forensics, vulnerability management, security architecture, application security).
  • Proficient in advanced analytical techniques.

Responsibilities

  • Ensure business and technology remain within risk tolerance for all applicable Cybersecurity risk appetites and sustain it with the consistent operating model.
  • Enhance current vulnerability management (VTM) operating model in line with BFT Risk Governance organization with Path-to-appetite and reporting.
  • Timely escalate to CISO Leadership and Businesses and ensure VTM risk treatment responses are entered in a timely fashion
  • Support Vulnerability Organization to improve the quality and integrity of VTM/GEM reports
  • Continue supporting vulnerability management Uplift Program activities and reduce risk while reducing stakeholders' pain-points (data/reporting, false positives, processes).
  • Perform root cause analysis of VA Issues and identification of repeated offenders for high risk vulnerabilities
  • Work with SIM and ISO community to facilitate the adherence of SIRT reporting timelines as per defined within SIRT standard, as well as identify deviations and its cause
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service