JobHire
face icon
Register to automatically apply for this and similar jobs
Register
star

IT Security Analyst 3 - Vulnerability Management

Stafford Gray

Dimondale, michigan


Job Details

Contract


Full Job Description

Candidates must be currently local within a commutable distance, no more than 1-1.5 hours. Manager is not interested in candidates who would need to relocate to accept the role. Position will be hybrid, in office 2 days a week upon start. Onsite interviews to be held at the Dimondale, MI office. (NO virtual interviews will be requested) Candidates submitted must be willing to attend a face-to-face interview.

·       Supports vulnerability management scanning and reporting tools (requires strong Linux, Windows and/or UNIX administrative knowledge for troubleshooting).

  • Automates processes with scripting such as bash, PowerShell, and Python.
  • Parses logs in an automated fashion using Grep, AWK, Sed, etc.

·       Creates integration of vulnerability management data with other State of Michigan enterprise services.

·       Conducts data analysis of vulnerability management data, often integrated with other data sources, to measure effectiveness of vulnerability remediation.  Data analysis tasks include large datasets, which include structured, semi-structured, and unstructured data.

·       Interfaces with other agencies to make recommendations on how to improve the security posture and reduce the number of security related vulnerabilities.

·       Conducts trend analysis, creates dashboards using data scripting to provide metrics on the performance of security responsibilities, controls, and creates new reports based on those collected metrics across multiple agencies.

·       Plans, schedules, implements, and maintains scalable vulnerability scans using modern vulnerability management scanning tools for high complexity devices.

·       While ensuring safe and timely scanning that has minimal/no impact on scan targets and provides troubleshooting of technical issues with scans.

·       Conducts internal vulnerability audits of servers, network devices, applications, and other devices.

·       Reviews and validates security procedures to ensure adequate security procedures have been developed to identify and classify cyber events.

Requirements

·       5+ years’ experience in IT Security

·       Extensive experience with vulnerability management scanning and reporting tools.

·       Experience with Linux, Windows, and Unix.

·       Experience with PowerShell and Python.

·       Experience with log parsing using - Grep, Sed and/or AWK.

·       Preferred experience with SQL ETL.

Get 10x more interviews and get hired faster.

JobHire.AI is the first-ever AI-powered job search automation platformthat finds and applies to relevant job openings until you're hired.

Registration