Vulnerability Management Analyst Job Description Template

Our growing organization is seeking a Vulnerability Management Analyst with experience in enterprise vulnerability assessment and management. This role will utilize expertise with information security to discover, analyze, and characterize risks to our network, applications, databases, and other components of our information system. The ideal applicant should be passionate about security, stay up-to-date on the latest technology and industry best practices, and work well in a collaborative team environment.

Typical Duties and Responsibilities

  • Oversee the coordination of security incident response
  • Perform recurring and on-demand scanning of organization systems and cloud environments
  • Resolve information security incidents, including targeted threats and internal incidents
  • Maintain documentation regarding threat management, including policies and procedures
  • Assist technology teams to develop, implement, and automate security solutions
  • Improve and automate existing vulnerability management systems
  • Monitor intrusion detection systems to identify potential threats
  • Research and assess emerging security threats and vulnerabilities
  • Provide technical support for vulnerability management projects
  • Communicate the risks of identified vulnerabilities and recommend security controls to mitigate them

Education

  • Bachelor’s degree in computer science, information security, or a related field

Required Skills and Experience

  • 3+ years of experience in vulnerability management or compliance monitoring
  • Experience leading in a cybersecurity environment
  • Experience in vulnerability scanning, penetration testing, network admission control, and/or SIEM
  • Experience in design and implementation of security technologies 
  • Experience with IT controls monitoring for regulatory and compliance requirements
  • Experience with visualization tools
  • In-depth knowledge of information security best practices
  • Knowledge of technical concepts such as cloud computing, automation, networking, and application development
  • Knowledge of vulnerability data management and reporting process automation
  • Knowledge of OWASP tools and methodologies
  • Knowledge of scripting languages such as Perl or Python

Preferred Qualifications

  • Professional certification such as CEH, CVA, CISSP, CISA, or CISM
Contact us

Recruit with Nexus IT Group