What are the responsibilities and job description for the Cyber Security (Vulnerability Management) position at American Technology Consulting?
IT Security Analyst 3 – Vulnerability Management
Overview:
- Supports vulnerability management scanning and reporting tools (requires strong Linux, Windows and/or UNIX administrative knowledge for troubleshooting).
- Automates processes with scripting such as bash, PowerShell, and Python.
- Parses logs in an automated fashion using Grep, AWK, Sed, etc.
· Creates integration of vulnerability management data with other State of Michigan enterprise services.
· Conducts data analysis of vulnerability management data, often integrated with other data sources, to measure effectiveness of vulnerability remediation. Data analysis tasks include large datasets, which include structured, semi-structured, and unstructured data.
· Interfaces with other agencies to make recommendations on how to improve the security posture and reduce the number of security related vulnerabilities.
· Conducts trend analysis, creates dashboards using data scripting to provide metrics on the performance of security responsibilities, controls, and creates new reports based on those collected metrics across multiple agencies.
· Plans, schedules, implements, and maintains scalable vulnerability scans using modern vulnerability management scanning tools for high complexity devices.
· While ensuring safe and timely scanning that has minimal/no impact on scan targets and provides troubleshooting of technical issues with scans.
· Conducts internal vulnerability audits of servers, network devices, applications, and other devices.
· Reviews and validates security procedures to ensure adequate security procedures have been developed to identify and classify cyber events.
Required Skills:
- 5 years’ experience in IT Security
- Extensive experience with vulnerability management scanning and reporting tools.
- Experience with Linux, Windows, and Unix.
- Experience with PowerShell and Python.
- Experience with log parsing using - Grep, Sed and/or AWK.
- Preferred experience with SQL ETL.