
Risk Analyst - Vulnerability Management
- Pittsburgh, PA
- Permanent
- Full-time
- Bachelor’s degree in Business, Technology, Cyber Security, Technology Risk Management or related field or strong hands-on experience.
- 5+ years experience in information security, with a focus on Vulnerability Management and Risk Management
- Strong analytical and problem-solving skills; ability to decipher and prioritize asks accordingly
- Strong interpersonal skills.
- Experience in stakeholder management and cross-functional collaboration
- Knowledge of industry Risk management frameworks, common mitigation practices, and Organizational control management.
- Proficiency in process formulation and improvement.
- Proven solid written and oral communication skills with the ability to effectively communicate status, risks, and remediations to executive management.
- ISO 27001 standard knowledge is highly desirable.
- Governance and Risk Certification a plus (CRISC, CISM, CISA, or CISSP)
- Vulnerability Management Program Development:
- Design and implement a comprehensive vulnerability management framework
- Establish policies, procedures, and standards for vulnerability assessment and remediation
- Develop and maintain a vulnerability management lifecycle, from discovery to closure
- Create metrics and KPIs to measure program effectiveness and maturity
- Collaborate with IT teams on vulnerability management tools and platforms requirements to support the program's objectives
- Governance and Oversight:
- Develop and maintain a governance structure for the vulnerability management program
- Establish roles and responsibilities across the organization for vulnerability management
- Create and manage escalation procedures for high-risk vulnerabilities
- Ensure alignment of the program with overall security strategy and business objectives
- Risk Assessment and Prioritization:
- Establish a risk-based approach to vulnerability prioritization
- Develop and maintain a vulnerability scoring system tailored to the organization's risk profile
- Conduct regular risk assessments to identify critical assets and systems
- Process Improvement and Automation:
- Continuously assess and improve vulnerability management processes
- Identify opportunities for automation to increase efficiency and accuracy
- Develop and implement workflows to streamline vulnerability remediation
- Stakeholder Collaboration and Communication:
- Work closely with IT, engineering teams and business utils to understand their needs, integrate vulnerability management into their processes and align the program accordingly
- Facilitate cross-functional working groups to address complex vulnerability challenges
- Develop and deliver regular reports to executive leadership on program status and risk posture
- Incident Response Integration:
- Collaborate with the Security Operations team to identify risk, remediation and false positives, and ensure rapid mitigation of exploited vulnerabilities
- Participate in post-incident reviews to improve vulnerability management processes
- Develop playbooks for addressing critical vulnerabilities that pose imminent threats
- Training and Awareness:
- Develop and deliver training programs on vulnerability management for various stakeholders
- Create awareness materials to promote a security-conscious culture
- Mentor and guide other team members in vulnerability assessment and management
- Regularly remaining in a stationary position, often standing or sitting for prolonged periods
- Regularly communicating with others to exchange information
- Regularly required to attend meetings in person and virtually using video and audio computer equipment
- Regularly repeating motions that may include the wrists, hands and/or fingers, such as typing
- Occasionally moving about to accomplish tasks or moving from one worksite to another
- Occasionally light work that includes moving objects up to 20 pounds
- Hybrid work schedule (both on-site and remote)
- The employee will normally work in a temperature-controlled office environment, with frequent exposure to electronic office equipment. During visits to areas of operations, may be exposed to extreme cold or hot weather conditions. Is occasionally exposed to fumes or airborne particles, toxic or caustic chemicals, and loud noise