Lead Vulnerability Management Engineer
  • Home
  • Lead Vulnerability Management Engineer
Lead Vulnerability Management Engineer
  • Full Time
  • Boston, MA, USA
  • This position has been filled

Website IT Recruiters for Tech Jobs - itrecruiters.technology

Information Technology Staffing Firm

Lead Vulnerability Management Engineer, Boston, MA

We are seeking a Lead Vulnerability Management Engineer. The purpose of Cybersecurity Engineering and Operations is to provide best in class and versatile security services to the enterprises. Within the Cybersecurity Operations team, there are many agile squads that have distinct responsibilities. The vulnerability management squad is focused to identify configuration and software vulnerabilities in the computing environment. To assist with risk-based prioritization remediation efforts that can reduce the overall risk profile and to utilize vulnerability management success to drive operational change.

Responsibilities:

– The IT security engineer will be responsible for applying vulnerability management principles and best practices to proactively protect and maintain the confidentiality, integrity, and availability of computing environment.
– Ensures continuous vulnerability lifecycle management with detecting, monitoring, and reporting vulnerability data. Provides engineering support and enhancements for a global vulnerability management program.
– Support includes run books, scan templates, scan scheduling, scanning networks and advanced scanning authentication (secrets and certificates).
– Drives requirements, evaluations, implementations, and troubleshooting of vulnerability management capabilities. These capabilities support a global vulnerability management program. Responsibilities include documenting engineering processes and practices that supports cyber security operations.
– Support vulnerability management team with establishing individual goals that support overall objectives.
– Assesses current and emerging threats, cyber attacks, and zero-day vulnerabilities that pose risks to the company.
– Support compliance and risk management activities, recommending security controls and corrective actions to mitigate vulnerability risks.
– Provides communication and interfacing with leadership, driving vulnerability management engineering best practices, and representing the technology risk management program.
– Strategically architect vulnerability collection points and scanners that provide visibility and perspectives on the network. The network perspectives include public networks, location private networks (wired and wireless), data centers, DMZ networks, endpoints and IoT devices.
– Identify vulnerability data is aligned with asset management to identify critical assets combined with threat data to assist with completing a risk equation, or a risk value. The risk score is a compilation of many data sources that assist with identifying a certain population set to prioritize remediation.

Qualifications:

– Bachelor’s Degree or equivalent.
– Minimum 8+ years of experience in Cybersecurity with at least 4+ years of vulnerability management experience working with tools such as Rapid 7, Qualys, Tenable (Experience in at least one of them) which includes implementation, upgradation, complex analysis, and integration in the production.
– At least 2+ years of demonstrated experience in vulnerability management reporting tools like Kenna, NorthStar or Brinqa.
– Experience in public cloud vulnerability management and understanding of public IP space and perimeters.
– Problem solving skills to resolve problems effectively and creatively while maintaining a high level of flexibility, professionalism, and integrity.
– Information Security Certifications related to vulnerability management like CISSP, CISM or CRISC.
– Experience in Information Security Risk Management frameworks and best practices for Vulnerability management, Risk Analysis, Reporting Metrics and Assessments.

Keywords: Boston MA Jobs, Lead Vulnerability Management Engineer, Vulnerability Management, Cybersecurity, Rapid 7, Qualys, Tenable, Kenna, NorthStar, Brinqa, Public Cloud, CISSP, CISM, CRISC, Security Risk Management, Massachusetts Recruiters, IT Jobs, Massachusetts Recruiting

Looking for a top IT recruiter to help your company hire for similar positions in Boston, MA or in other cities? Our IT recruiting agencies and staffing companies can help.

We help companies that are looking to hire Lead Vulnerability Management Engineers for jobs in Boston, Massachusetts and in other cities too. Please contact our IT recruiters for tech jobs and IT staffing companies today! Phone 630-428-0600 ext 14 or email us at jobs@itrecruiters.technology. Click here to submit your resume for this job and others.

Atlanta IT Recruiters, Austin IT Recruiters, Baltimore IT Recruiters, Boston IT Recruiters, Charlotte IT Recruiters, Chicago IT Recruiters, Cincinnati IT Recruiters, Cleveland IT Recruiters, Columbus IT Recruiters, Dallas IT Recruiters, Denver IT Recruiters, Detroit IT Recruiters, Fort Lauderdale IT Recruiters, Houston IT Recruiters, Indianapolis IT Recruiters, Jacksonville IT Recruiters, Kansas City IT Recruiters, Los Angeles IT Recruiters, Miami IT Recruiters, Minneapolis IT Recruiters, Nashville IT Recruiters, New Jersey IT Recruiters, New York City IT Recruiters, Philadelphia IT Recruiters, Phoenix IT Recruiters, Raleigh-Durham IT Recruiters, Salt Lake City IT Recruiters, San Antonio IT Recruiters, San Diego IT Recruiters, San Francisco IT Recruiters, San Jose IT Recruiters, Seattle IT Recruiters, Silicon Valley IT Recruiters, St Louis IT Recruiters, Tampa IT Recruiters, Washington DC IT Recruiters

Information For Employers > General Information | About Us | How We Work | Trading Industry | Healthcare Information Technology | Government Contract Expertise | Request Services

Information For Job Seekers > General Information | Find A Job | Submit Resume | How We Work | Trading Industry Tech Pros | Healthcare (HIT) | Security-Cleared | Successful Interviewing | Sample Interview Questions

General Information > About Us | Our Values | Meet Our President | Position Types | Technologies | Blog | Coverage Area