Epicareer Might not Working Properly
Learn More

Associate, Threat & Vulnerability Management

Salary undisclosed

Apply on

Availability Status

This job is expected to be in high demand and may close soon. We’ll remove this job ad once it's closed.


Original
Simplified

About Us:

Established in 1997, PruTech is committed to innovative problem-solving, solution creation, and fostering strong client partnerships. Serving a diverse array of industries, from government to finance, retail, and manufacturing, PruTech operates from strategic locations including New York City, Washington DC, North Carolina, and boasts a nearshore office in Mexico City and multiple offshore offices in India.

With over two decades of experience in Information Technology and system integration, PruTech offers a comprehensive suite of services to meet evolving technological needs:

  • Project-based system integration
  • Custom software solutions
  • Package implementations
  • Consulting and advisory services
  • Big data and analytics
  • Nearshore and offshore services

At PruTech, we are dedicated to shaping the future of technology and driving success for our clients through innovative solutions and strategic partnerships.

Role: Associate, Threat & Vulnerability Management

Location: Indianapolis IN

Duration: 6-month contract to hire

Pay Rate: $40/hr on W2 with Health Benefits

We are seeking a skilled Vulnerability Management Analyst with a minimum of 3 years of experience in vulnerability assessment, server OS patch management, and remediation of End of Life/End of Service (EOL/EOS) software on servers and an overall 5 years of experience in IT. The ideal candidate will have a strong background in identifying, assessing, and mitigating security vulnerabilities, as well as experience in managing and applying server OS patches across a variety of environments.

What You'll Do

Vulnerability Management:

  • Conduct regular vulnerability assessments across all IT assets using industry-standard tools.
  • Analyze and prioritize vulnerabilities based on risk, impact, and exploitability.
  • Collaborate with various teams to remediate identified vulnerabilities promptly.

Server OS Patching:

  • Manage and oversee the patching process for Windows Server 2016/2019/2022 and Redhat Linux 7/8/9 operating systems, ensuring that all systems are up-to-date with the latest security patches.
  • Develop and implement patch management strategies, ensuring minimal disruption to business operations.
  • Track and report on patch compliance across the organization.
  • End of Life/End of Service (EOL/EOS) Software Remediation:
  • Identify and track software that is approaching or has reached the end of service life.
  • Coordinate with application owners and IT teams to plan and execute the upgrade or replacement of EOL/EOS software.
  • Ensure that all EOL/EOS software is either decommissioned or upgraded to supported versions to maintain security compliance.

Security Monitoring & Incident Response:

  • Monitor security alerts and incidents related to vulnerabilities and patch management.
  • Assist in the investigation and response to security incidents that involve unpatched systems or EOL/EOS software.
  • Provide recommendations for improving security posture and reducing vulnerability exposure.

Documentation & Reporting:

  • Maintain accurate and detailed documentation of vulnerability assessments, patch management activities, and EOL /EOS software remediation efforts.
  • Generate reports for management, highlighting the status of vulnerabilities, patching, and EOL/EOS software.
  • Contribute to the development of security policies and procedures related to vulnerability management.

Education:

  • Bachelor's Degree: Computer Science, Information Technology, Cybersecurity, or a related field.
  • Relevant certifications (e.g., CISSP, CEH, CompTIA Security+) are a plus.

Experience:

  • Minimum of 3 years of experience in vulnerability management, server OS patching, and software lifecycle management.
  • Experience with vulnerability management tools (e.g., Nessus, Qualys, Rapid7).
  • Strong understanding of operating systems (Windows, Linux) and their respective patching processes.
  • Familiarity with ITIL processes and change management.
  • OS Admin experience [scripting knowledge to push notifications to 200-300 servers]
  • The InfoSec team gives them the vulnerability analysis and sends it to the Ops team to remediate. The analyst will then troubleshoot the servers/apps and remediate them.
  • Server patching and remediating are a must-have.
  • Strong analytical and problem-solving skills.
  • Excellent communication skills, with the ability to explain technical concepts to non-technical stakeholders.
  • Detail-oriented with a focus on accuracy and compliance.
  • Ability to work independently and as part of a team in a fast-paced environment.

PruTech abides by the requirements of 41 CFR 60-1.4(a), 60-300.5(a), and 60-741.5(a). All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, or national origin.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job