About The Position

The Cybersecurity Vulnerability Management Analyst will support the organization's vulnerability management and threat detection capabilities. You will be responsible for identifying, analyzing, and mitigating cybersecurity risks for our organization as well as developing and implementing security strategies aligned with business goals.

Requirements

  • 7+ years of experience in cybersecurity, IT security, or a related technical field.
  • Excellent communication and interpersonal skills, with the ability to convey technical concepts to non-technical stakeholders.
  • Experience with vulnerability management practices, methodologies and technology.
  • Strong analytical and problem-solving skills.
  • Excellent documentation and technical writing abilities.
  • Ability to work in a fast-paced environment and handle multiple priorities.

Nice To Haves

  • 5+ years of experience with misconfiguration management.
  • 3+ years of experience with Axonius and Qualys.
  • 5+ years of experience with external attack surface management (ASM).
  • 5+ years of experience with automation and workflow management.

Responsibilities

  • Conduct thorough risk assessments and vulnerability analyses.
  • Contribute to developing and implementing a cybersecurity strategy in alignment with organizational objectives.
  • Stay current on emerging cybersecurity threats and trends, incorporating threat intelligence into risk assessments.
  • Create threat and risk bulletins that will provide awareness to Security Operations, IT teams, and leadership.
  • Define and enforce cybersecurity policies, standards, and procedures.
  • Contribute to the Vulnerability Management Program and coordinate with IT teams to ensure timely patching and mitigation of identified vulnerabilities.
  • Monitor and report on Key Performance Indicators (KPIs) related to cybersecurity effectiveness.
  • Develop action plans, timelines, and reports to address and improve the security posture of the enterprise.
  • Help maintain and optimize security monitoring tools and detection rules.
  • Collaborate with other security teams and IT partners during vulnerability management remediation activities.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service