The Vulnerability Analyst is responsible for identifying, assessing, prioritizing, and tracking remediation of security vulnerabilities across PT Solutions’ technology environment. This role focuses on turning scanner output and vendor advisories into actionable remediation plans, partnering with IT and business teams to reduce risk while minimizing operational impact. The Vulnerability Analyst supports the overall cybersecurity program by providing clear risk-based guidance, metrics, and continuous improvement of vulnerability management processes, and performs other related duties as assigned to support the Information Security and broader IT programs. Essential Functions Vulnerability Identification and Analysis Operate, tune, and maintain vulnerability management tools (e.g., Tanium, Defender, and related platforms) to ensure accurate asset and vulnerability coverage. Perform scheduled and ad hoc scans of servers, endpoints, cloud workloads, and key applications. Analyze vulnerability data to validate findings, eliminate false positives, and group issues by risk and business impact. Monitor threat intelligence (e.g., KEV, vendor advisories, zero-day disclosures) and align findings to PT Solutions’ environment. Vulnerability Prioritization and Remediation Coordination Develop and maintain risk-based prioritization models using factors such as CVSS, KEV, exploitability, asset criticality, and data sensitivity. Translate technical findings into clear remediation tasks for Infrastructure, End-User Computing, Application, and Cloud teams. Track remediation progress against defined SLAs and escalate overdue items to leadership as appropriate. Validate remediation through follow-up scans, targeted checks, and exception review. Reporting, Metrics, and Communication Produce recurring reports (weekly, monthly, quarterly) on vulnerability posture, trends, and key risk indicators. Prepare executive summaries that communicate risk in business terms, including exposure reduction, SLA performance, and emerging issues. Present vulnerability findings and progress in cross-functional meetings and governance forums. Tool and System Management Maintain asset inventories and vulnerability tool configurations to ensure consistent and reliable scanning coverage. Recommend enhancements to scanning schedules, scope, and configuration to increase coverage and reduce noise. Collaborate with IT and Security Engineering to integrate vulnerability data with other security tools and dashboards. Cybersecurity Program Support and Improvement Contribute to the development and maintenance of policies, procedures, standards, and guidelines related to vulnerability management, patching, and configuration baselines. Align vulnerability practices with relevant frameworks (e.g., HITRUST, HIPAA, PCI DSS, CIS, SOC) and audit requirements. Support evidence collection and documentation for internal and external audits, assessments, and certifications. Incident and Risk Support Provide vulnerability context and impact analysis during security incidents and investigations. Assist with root-cause analysis for recurring or high-impact vulnerabilities and recommend control improvements. Participate in risk assessments and support the integration of vulnerability data into enterprise risk management. Vendor and Third-Party Management Support the evaluation of third-party products and services from a vulnerability and patching perspective. Review vendor advisories, end-of-life notices, and security bulletins to identify required actions for PT Solutions. Provide technical input to security questionnaires, risk assessments, and remediation plans for key vendors and partners.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Entry Level