What are the responsibilities and job description for the IT Security Vulnerability Specialist position at Covetus, LLC?
Job Details
Job description
Title: IT Security Vulnerability Specialist
Location: Charlotte, NC / Plano, TX
Fulltime Role
Overview:
You will be responsible for identifying, assessing, and mitigating security vulnerabilities across the organization s IT infrastructure. This role involves conducting regular security vulnerability assessments, analyzing the results, tracking and collaborating with cross-functional teams to address or ensure adequate compensating controls are in place. The successful candidate will have hands-on IT Security skills and methodologies to identify risks and propose and actively participate in implementing mitigation solutions, defenses and countermeasures to protect its operations.
Responsibilities:
Be an individual contributor and a great team player with a mindset to improve, secure and support the business
Co-ordinate and manage timely remediation of security vulnerabilities and attack surface findings across various technologies
Identify, resolve, and document any false positive findings from vulnerability assessment results, attack surface findings and other reported vulnerabilities
Perform weekly/monthly and ad-hoc vulnerability assessments for servers, user systems, network assets, public-facing assets and databases using (available commercial) Tenable and other open-source tools
Manage and troubleshoot vulnerability management and attack surface reductions tools
Track vulnerability remediation via ticketing system and perform validation by ad hoc scans
Be knowledgeable of the Common Vulnerability Scoring System (CVSS) vulnerability assessment method, operation concepts and corrective updates
Analyzes data, systems and network to identify gaps between security policy, IT controls and practice
Contribute to the development of IT Security standards, processes, procedures, and policies, and addresses exceptions for vulnerability management policy and program
Requirements:
Bachelor or specialized college degree in Information Management, Computer Science, System Engineering or another related IT program with 5 Years of applicable experience
Have a minimum of 3 years of hands-on experience working with above said vulnerability tools and 5 to 8 years of experience in the information security domain
Professional designation such as CISSP, CISM, SANS GIAC (Global Information Assurance Certification) or equivalent;
Strong interpersonal skills, including the ability to influence others and establish credibility with key stakeholders
Excellent oral and written communication skills
Ability to work with small teams to achieve goals and meet deadlines in a fast-paced environment
Can work independently with minimal supervision and direction