
Vulnerability Management Specialist
- Olympia, WA
- $97,356-130,992 per year
- Permanent
- Full-time
- Review threat intelligence data from a variety of feeds and utilize that information to make appropriate risk-based decisions regarding vulnerability management and remediation.
- Conduct and review vulnerability scans across enterprise applications and infrastructure using various tools and techniques.
- Conduct risk-based analysis and prioritization for vulnerabilities.
- Track and report on vulnerability, threat and attack surface findings.
- Collaborate with Security Operations and Incident Response analysts to ensure appropriate cross-enterprise security operations and visibility.
- Provide technical support for patching, remediation and attack surface reduction.
- Evaluate the performance and quality of both existing and potential vendors, including their products or services.
- Conduct regular audits and reviews of vendors and their processes to identify any risks or opportunities for improvement.
- Develop and maintain enterprise vulnerability and attack surface management processes.
- Deliver technical support, administration, and configuration oversight for vulnerability management and attack surface platforms and components by working directly with the tools and providing assistance to WaTech and agency customers.
- Design, implement, and validate automated patches, remediation and attack surface solutions across the enterprise for new and existing tools.
- Assist in the development of enterprise vulnerability and attack surface management policies.
- Coordinate with agencies to assess impacts to agencies related to compliance with policy and process adoption across the enterprise to drive adoption and maximize vulnerability and attack surface reduction activities.
- Leverage vulnerability metrics to ensure appropriate threat hunting and attack surface reduction are integrated into the full service of security operations capabilities.
- Eleven years of IT experience supporting vulnerability management, security analytics, and/or remediation/patch management. *A bachelor's degree in an IT field or related field may substitute on a year-for-year basis for up to four years of required experience.
- In depth knowledge of:
- Cybersecurity principles, standards and best practices.
- Vulnerability assessment tools and techniques.
- Threat intelligence sources and methods.
- Cybersecurity risk management and priority modeling, analysis and planning.
- Risk Assessment processes, and how they apply to IT infrastructure.
- Incident Response processes and procedures.
- Network and system infrastructure and related design.
- Two years of experience with vendor management.
- Two years' experience writing and implementing security procedures across large, diverse organizations.
- CompTIA SEC+, CISSP, CCSP, GISP, CEH, platform (Cisco, Juniper, Microsoft, etc.) specific or similar industry-standard certification.
- Thorough knowledge of Security standards and regulations such as ISO 27001/27002, COBIT, NIST 800-53, NIST CSF, ITIL, HIPAA, CJIS, etc.
- Experience in independently working with and implementing new information technology solutions, unfamiliar architecture, and cutting-edge technology within a service provider and enterprise environment
- Submit a complete Online Application.
- Answer all required Supplemental Questions.
- Attach a Letter of Interest that addresses how your experience qualifies you for this role.
- Attach a Resume that clearly documents the work history, training, and education that makes you a viable and competitive candidate for this position.
- Attach a separate document with at least Three Professional References. This should include: reference name, nature of the relationship (i.e. company and supervisor, coworker, etc.), phone number, and email. References should be individuals you have worked with in the past five years, if possible, and include at least one current, or most recent supervisor. *We will not conduct reference checks without your signed release.