What are the responsibilities and job description for the IT Security Analyst 3 - Vulnerability Management position at Integrated Resources, Inc ( IRI )?
Job Title: IT Security Analyst 3 - Vulnerability Management
Location: Dimondale, MI (Hybrid)
Duration: 12 Months
Interview: Onsite interviews to be held at the Dimondale office
Job Description:
Location: Dimondale, MI (Hybrid)
Duration: 12 Months
Interview: Onsite interviews to be held at the Dimondale office
Job Description:
- Supports vulnerability management scanning and reporting tools (requires strong Linux, Windows and/or UNIX administrative knowledge for troubleshooting).
- Automates processes with scripting such as bash, PowerShell, and Python.
- Parses logs in an automated fashion using Grep, AWK, Sed, etc.
- Creates integration of vulnerability management data with other client's enterprise services.
- Conducts data analysis of vulnerability management data, often integrated with other data sources, to measure effectiveness of vulnerability remediation. Data analysis tasks include large datasets, which include structured, semi-structured, and unstructured data.
- Interfaces with other agencies to make recommendations on how to improve the security posture and reduce the number of security related vulnerabilities.
- Conducts trend analysis, creates dashboards using data scripting to provide metrics on the performance of security responsibilities, controls, and creates new reports based on those collected metrics across multiple agencies.
- Plans, schedules, implements, and maintains scalable vulnerability scans using modern vulnerability management scanning tools for high complexity devices.
- While ensuring safe and timely scanning that has minimal/no impact on scan targets and provides troubleshooting of technical issues with scans.
- Conducts internal vulnerability audits of servers, network devices, applications, and other devices.
- Reviews and validates security procedures to ensure adequate security procedures have been developed to identify and classify cyber events.
- 5 Years' IT Security Experience
- Experience with vulnerability management scanning and reporting tools (requires strong Linux, Windows and/or UNIX administrative knowledge for troubleshooting).
- Experience with trend analysis and creating dashboards using data scripting to provide metrics on the performance.
- Experience with Linux, Windows and Unix.
- Experience with PowerShell and Python.
- Experience with log parsing using grep, sed or AWK.
- Experience with SQL ETL.