Hiring - Sr Security Engineer - Atlanta, GA
Job Tittle: Sr Security Engineer
Job Type: W2 Contract
Location: Atlanta, GA
Duration: 18 month contract
Job Description:
Qualifications:
- 5+ years of experience in Qualys (VMDR), Policy Compliance, and Vulnerability Management.
- 2+ years of experience in Kenna Security, Vulcan, or equivalent solution.
- Scripting experience with PowerShell, Python, REST API.
- Experience developing reports in MS PowerBI.
- Experience working with IoT/OT technology.
- Working knowledge of cloud environments such as AWS, GCP, and Azure.
- Bachelor’s degree in Information Security, Information Technology, or Computer Science.
- Knowledge of vulnerability management, policy compliance, and web application scanning solutions.
- Basic understanding of regulatory structures such as PCI, PII, and GDPR.
- Creative and adaptive work ethic, with a strong customer-oriented attitude.
- Ability to clearly communicate and present to various levels of the organization.
- Strong organizational and analytical skills with attention to detail.
- Independent and self-motivated with a very thorough work ethic.
- Ability to identify gaps in process and develop solutions.
- Experience crafting tools to improve efficiency performing routine tasks.
- Experience with Excel functions and extracting data using multiple criteria.
- Understanding of Vulnerability Management holistically as a program.
Responsibilities:
- Building and growing a next-generation vulnerability management program.
- Providing remediation guidance and recommendations and coordinating with the Technology organization, IT, and other teams as needed to provide oversight to the remediation and/or mitigation of enterprise vulnerabilities.
- Evaluating and deploying vulnerability reporting solutions to aggregate and centralize all infrastructure, application, and container vulnerabilities.
- Extensive Windows, Mac, and Linux experience and common configuration deficiencies.
- Thorough understanding of desktop, server, application, database, and network security hardening principles and practices for threat prevention.
- Developing vulnerability reports and scorecards that define the current state of the corporate network security risk posture.
- Performing research and analysis of scheduled and on-demand vulnerability assessments and post results.
- Researching exploit techniques and mitigation strategies.
- Performing analysis of asset and vulnerability information to identify risks that were not discovered via automated scanning.
- Troubleshooting issues that may occur during automated network scanning and/or agent scans.
- Reviewing public and private vulnerability notifications/disclosures, consuming research findings, and prioritizing remediation efforts.
- Integrating vulnerability management tools with other systems, such as CMDB, SIEM, and Archer, PowerBI.
- Assisting with implementing policy compliance tools to monitor compliance against CIS and other industry-related benchmarks.
- Assisting with the implementation of IoT and OT security solutions to discover and secure unmanaged assets.
- Developing rules to identify non-compliant resources in our cloud environments and creating automations to remediate the non-compliant resources.
Thanks & Regards
Javid Ahmad
Sr. Technical Recruiter
Tigerbells LLC
Suite 52, 1405 Chews Landing Rd.
Laurel Springs, NJ 08021
Phone: +1 609 759 1987
LinkedIn: linkedin.com/in/javid-ahmad-598111158
Email: javid@tigerbells.com