What are the responsibilities and job description for the Information Security Analyst [Vulnerability Management] position at MILLENNIUMSOFT?
Job Title - Information Security Analyst [Vulnerability Management]
Location - San Diego, CA or Franklin Lakes, NJ [Remote OK]
Duration – 12 Months
Work hours : 8am-5pm, 40 hours / week
Client : Medical Device Company
Employment Type : Contract on W2 (Need US Citizens Or GC Holders Only)
Remote OK, would prefer NJ or San Diego
Description :
3 must have’s on the resume Vulnerability Management, Threat Intel and Good Communication Skills
The Information Security Analyst will support the Threat & Vulnerability team within Security Operations. General responsibilities focus on the identification and proactive mitigation of cyber threats which could impact BD, while collaborating with various teams within Information Security to support the company’s strategic goals.
This person has experience in risk prioritization, navigating sources for identification and assessment of threats, and conducting cross-functional awareness for addressing risk. They will have experience assisting with vulnerability analysis and working across a matrixed environment to assess indicators and triage risk for the enterprise, manufacturing and product environments.
You are comfortable providing fact-based reports to various levels of the organization within a fast-paced environment. You have previous tactical intelligence or vulnerability management experience, understand the fundamentals of reducing attack surfaces, and possess effective analytical skills. You will be accountable for setting your own work direction and completing tasks.
Essential Job Functions :
The following duties and responsibilities are intended to be representative of the work performed by the incumbent(s) in this position and are not all-inclusive. The omission of a specific duty or responsibility will not preclude it from the position.
- Under direction, report and communicate vulnerabilities to determine objectives, scope, analysis, and the proper actions, needed to respond to security vulnerabilities that may impact BD
- Partner with stakeholders to document lifecycle of vulnerabilities and provide recommendations for mitigation strategies.
- Collaborate on patch validation and reporting of remediation planning and compensating controls of mitigation to address open vulnerabilities
- Monitors, tracks, responds, investigates, and reports in compliance to security requirements, and partners with the responsible parties to drive timely results and remediation
- Perform analysis of cyber threats and process timely tasks to help mitigate the risk of exposure.
o This includes reviewing daily intelligence feeds, working with different Security Operations teams to apply technical controls to detect and protect BD systems.
Basic Qualifications :
Education and / or Experience :
Physical Demands :
Use of computer, phone, ability to travel globally.
Work Environment :
Office and remote locations
Keywrods : Vulnerability Management, Threat Intel, Security , Security Operations, cyber threats, incident response, detection