What are the responsibilities and job description for the Vulnerability Assessment Analyst position at Beacon Technologies?
Beacon Technologies is seeking a Vulnerability Assessment Analyst for our client partner. This position will lead meetings every 2 weeks with data, infrastructure and desktop teams and participate in monthly meetings with IT leadership. In the first 90 days one task will be to make sure the current data in the dashboards is accurate. This position is hybrid, preferably within our client's service area but NOT in CA or NY. Prefer experience with HIPAA framework or other type of framework where vulnerabilities are flagged. Medium level coding in Python or PowerShell is also preferred. Other tools used are Qualys and / or Nessus as well as Burp Suite and Git Hub Security Suite. The person in this role may evaluate current tools and recommend changes / improvements. Team includes a lead Security Analyst who will work closely with the person in this position. Experience with vulnerability assessment tools and good communication skills.
- Facilitates the timely identification, assessment, and mitigation of system vulnerabilities across the organization.
- Constantly improves the Vulnerability Management program by refining processes, procedures, metrics, and tools to enhance overall program effectiveness.
- Collaborates with cross functional teams, stakeholders, and system owners to ensure vulnerabilities are addressed efficiently, contributing to a reduction in the organization's vulnerability footprint.
- Additionally, the role involves updating and maintaining dashboards to effectively visualize complex data, track trends, and provide insights into the status of the vulnerability management program, helping to guide decision-making and inform security priorities.
- Influence system owners, application owners, and operations support teams to understand vulnerability impact and implement expedient mitigations. 40%
- Collaborate closely with system and application owners to clearly communicate the business and technical impact of identified vulnerabilities.
- Provide guidance on best practices and assist in prioritizing remediation actions based on risk levels.
- Offer expertise and support to ensure timely resolution of vulnerabilities and maintain an effective, continuous improvement cycle.
- Act as a liaison between security teams and functional teams to foster alignment and urgency in addressing vulnerabilities.
- Discern accuracy of reported vulnerability dispositions and when appropriate reprioritize criticality, remove false positives, and work to address root causes of misaligned dispositions. 30%
- Review vulnerability reports to assess the accuracy and validity of findings, focusing on ensuring correct categorization and severity.
- Identify and eliminate false positives through thorough verification and correlation with other data sources.
- Reassess the criticality of vulnerabilities and work with stakeholders to reclassify or reprioritize based on evolving business needs.
- Identify patterns or systemic issues in vulnerability reporting and collaborate with teams to resolve underlying causes of misclassifications or misalignments.
- Identify and resolve gaps related to our vulnerability reporting toolset and overall program processes. 10%
- Evaluate and assess the effectiveness of current vulnerability management tools and reporting frameworks.
- Identify areas for improvement, including gaps in automation, integration, and data accuracy.
- Collaborate with cross-functional teams to streamline reporting processes, ensuring vulnerabilities are properly tracked, assessed, and mitigated.
- Provide recommendations for new tools or enhancements to existing systems to improve vulnerability detection and management.
- Assist with identifying code vulnerabilities in partnership with development.
- Collaborate with the development team to identify and address vulnerabilities within code, such as insecure coding practices or logic flaws.
- Assist in integrating secure coding practices into the development lifecycle through ongoing training and mentorship.
- Support the integration of automated static and dynamic analysis tools to improve the identification of code vulnerabilities early in the development process.
- Perform web application security assessments. 10%
- Conduct security assessments of web applications to identify vulnerabilities such as cross-site scripting (XSS), SQL injection, and other OWASP Top 10 risks.
- Analyze application security configurations and identify potential flaws in authentication, authorization, session management, and data handling.
- Provide recommendations and collaborate with developers to remediate web application security issues, ensuring secure deployment in production environments.
- Identify remediation options from 3rd party pen test results. 5%
- Review findings from third-party penetration tests to identify actionable remediation steps.
- Prioritize recommendations based on risk, criticality, and business context to ensure efficient and impactful resolution.
- Work with technical teams to implement the appropriate fixes and mitigation strategies based on pen test outcomes.
- Any actions to help drive or enable our client : 5%
- Vision, Mission, Values, Culture, DEI & Belonging, Engagement, Employee Resource Groups (ERGs), and Learning & Development or any activity that foster employee well-being and connection.
Qualifications :
Required Experience :
Preferred Experience :
Position Characteristics :
Physical Effort and Working Conditions :
About Beacon Technologies
Are you looking to advance your career in information technology? Beacon Technologies offers career advancement opportunities, extensive training, and excellent benefits including paying for health and dental premiums for salaried employees. In addition to providing interesting opportunities, Beacon Technologies provides that old fashioned, personal touch, so you feel like a part of the Beacon team.
Beacon Technologies, Inc. is an equal employment opportunity employer with a functioning Affirmative Action Plan. It is the policy of Beacon Technologies, Inc. to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, religion, sex, sexual orientation, gender identity or expression, age, disability, marital status, citizenship, national origin, genetic information, ethnicity, ancestry, disability, medical condition, military and veteran status, or any other characteristic protected by law. Beacon Technologies, Inc. prohibits any such discrimination or harassment.