Direct message the job poster from CorSource
Energy Recruiter | Helping Professionals Build Careers That Power the Pacific Northwest
- Must be authorized to work in the U.S. without current or future sponsorship.
Overview
Define, identify, and classify the security holes (vulnerabilities) in a computer, network, or communications infrastructure.Configure vulnerability assessment tools, as well as perform scans, research and analyze vulnerabilities, identify relevant threats, corrective action recommendations, summarize and report out results.Identify critical flaws in applications and systems that cyber attackers could exploit.Conduct vulnerability assessments for networks, applications and operating systems.Qualifications
Education & Corresponding Experience
A degree in Computer Science, Information Technology, or a directly-related technical discipline is preferred.8 years of experience is required with an applicable Associates or Bachelor's degree.10 years of experience is required without an applicable degree or with no degree.Experience includes a minimum combination of work-related experience, on-the-job training, and / or vocational training. Experience should be consistent with the specific requirements of Computer / Information Technology or related field and progressively more technical in nature.Required Technical Skills & Experience
2 years' experience with the following :Classes of vulnerabilities, appropriate remediation, and industry standard classification schemes (CVE, CVSS, CPE).Linux and Windows operating systems, including common programming or scripting languages.Devising methods to automate testing activities and streamline testing processes.Knowledge of patching programs of major hardware / software manufacturers. Knowledge of secure configuration and hardening of systems.Knowledge of methods for on-going evaluation of the effectiveness and applicability of information security controls (e.g., vulnerability testing, and assessment tools).Knowledge of security vulnerabilities, application analysis, and protocol analysis.Knowledge of network topology, communication protocols, firewalls, proxies and IDS systems to effectively configure scanning software.Preferred Skills & Experience
Experience setting up and administering an enterprise cyber vulnerability scanning and assessment infrastructure.Experience administering computer systems in a 24 / 7 high availability operational environment.Experience using specific technologies such as Splunk.Experience administering Tenable.sc and Nessus.J-18808-Ljbffr