Vulnerability Management Risk and Mitigations Analyst
recruit an experienced technical analyst as a Risk and Mitigations Analyst within its Global Cybersecurity Vulnerability Management team. This role involves the research and evaluation of vulnerability scenarios to form strong conclusions on risk and response disposition. Analysts will apply technical experience to validate risk and verify the response actions to that risk. This position requires collaboration skills to drive remediation activities across the enterprise, organizational skills, proven analytic skills, attention to detail and vulnerability specific technical expertise.
What you will be responsible for
- Maintain situational awareness, collaborate, influence and lead initiatives across the enterprise
- Work closely with business units to understand people, process, and technology in order to build effective vulnerability management strategies
- Analyze vulnerability assessments and remediation plans
- Synchronize with Cyber Defense Center to monitor and research information sources to assess risk to the enterprise
- Update and maintain vulnerability management runbooks and playbooks
- Maintain operational effectiveness
- Update and communicate operational metric
- Researching vulnerability risk scenarios, including Common Vulnerabilities and Exposures (CVE), tactics, techniques and procedures (TTPs) and attack chains.
What we value
- The ability to quickly but thoroughly evaluate complex scenarios and make strong recommendations.
- Knowledge and understanding of vulnerability management and remediation
- Strong organizational, multi-tasking, and prioritizing skills
- Ability to work independently and solve challenging problems
- Knowledge and interest in vulnerability related trends
- Incredible attention to detail
Education & Preferred Attributes
- 3+ years of information security experience
- Ability to consider short term and long term implications of a recommended solution
- Ability to make difficult decisions in unique situations, present recommendations under pressure to senior leadership and to cross-functional teams that my have conflicting positions
- Knowledge and understanding of structuring complex data across varied data sources
- Expertise in designing solutions, implementing and maintaining new cybersecurity controls and tools
- Demonstrated ability to identify core issues and work with leaders and team members to resolution
- Strong organizational, task switching, and prioritizing skills
- Ability to work independently and solve challenging problems while collaborating with stakeholders
- Attention to detail
- Results driven
- Strategic thinking
- Collaboration and influencing
- Senior Executive communication
- Working professionally with confidential information
- Advanced presentation skills, both orally and written
- Ability to work well with others and under pressure
- Demonstrated professionalism in approach to communicating ideas and solutions in simple language to team members, senior leaders and business partners
- Knowledge of data handling tools, data management practises
- Knowledge of IT architecture and operations (computing, network, storage & cloud)
- Ability to work in an environment with a geographically dispersed team
- Security certification a plus
- Experience within a vulnerability management role
recruit an experienced technical analyst as a Risk and Mitigations Analyst within its Global Cybersecurity Vulnerability Management team. This role involves the research and evaluation of vulnerability scenarios to form strong conclusions on risk and response disposition. Analysts will apply technical experience to validate risk and verify the response actions to that risk. This position requires collaboration skills to drive remediation activities across the enterprise, organizational skills, proven analytic skills, attention to detail and vulnerability specific technical expertise.
What you will be responsible for
- Maintain situational awareness, collaborate, influence and lead initiatives across the enterprise
- Work closely with business units to understand people, process, and technology in order to build effective vulnerability management strategies
- Analyze vulnerability assessments and remediation plans
- Synchronize with Cyber Defense Center to monitor and research information sources to assess risk to the enterprise
- Update and maintain vulnerability management runbooks and playbooks
- Maintain operational effectiveness
- Update and communicate operational metric
- Researching vulnerability risk scenarios, including Common Vulnerabilities and Exposures (CVE), tactics, techniques and procedures (TTPs) and attack chains.
What we value
- The ability to quickly but thoroughly evaluate complex scenarios and make strong recommendations.
- Knowledge and understanding of vulnerability management and remediation
- Strong organizational, multi-tasking, and prioritizing skills
- Ability to work independently and solve challenging problems
- Knowledge and interest in vulnerability related trends
- Incredible attention to detail
Education & Preferred Attributes
- 3+ years of information security experience
- Ability to consider short term and long term implications of a recommended solution
- Ability to make difficult decisions in unique situations, present recommendations under pressure to senior leadership and to cross-functional teams that my have conflicting positions
- Knowledge and understanding of structuring complex data across varied data sources
- Expertise in designing solutions, implementing and maintaining new cybersecurity controls and tools
- Demonstrated ability to identify core issues and work with leaders and team members to resolution
- Strong organizational, task switching, and prioritizing skills
- Ability to work independently and solve challenging problems while collaborating with stakeholders
- Attention to detail
- Results driven
- Strategic thinking
- Collaboration and influencing
- Senior Executive communication
- Working professionally with confidential information
- Advanced presentation skills, both orally and written
- Ability to work well with others and under pressure
- Demonstrated professionalism in approach to communicating ideas and solutions in simple language to team members, senior leaders and business partners
- Knowledge of data handling tools, data management practises
- Knowledge of IT architecture and operations (computing, network, storage & cloud)
- Ability to work in an environment with a geographically dispersed team
- Security certification a plus
- Experience within a vulnerability management role