Vulnerability Analyst II
Manager- CyberSecurity
Salary Exempt
The Vulnerability Analyst II has been working in a cybersecurity role for three or more years. Ideally you have experience in Level 2 Help Desk and deliver excellent customer service in a professional environment. As a Vulnerability Analyst, you will play a crucial role in ensuring the security and integrity of our client's digital assets by identifying and mitigating potential vulnerabilities. You will be responsible for conducting regular assessments, collaborating with other IT and security teams, and implementing measures to safeguard against cyber threats. You understand high-quality customer service, respond with appropriate professionalism and urgency, and have a knack for adapting your interpersonal style to many different types of users. The Vulnerability Analyst is responsible for the completion of tasks, projects that will be assigned and tracked. Some travel and after hours/on call hour work may be required. To succeed in this role, you need to be detail-oriented, with strong organizational and time management skills.
Automate repeatable processes using a variety of tools including scripting.
Desirable scripting languages: PowerShell, Automate RMM, Datto RMM, and Python.
Conduct regular vulnerability assessments on systems, networks, and applications.
Utilize scanning tools and methodologies to identify vulnerabilities.
Analyze and interpret vulnerability scan results to prioritize high-risk areas.
Create and conduct reoccurring meetings with customers to talk through scan results, remediation steps and prioritization.
Plan and execute remediation projects that prioritize critical items, maximize operational efficiency, and minimize client impact.
Analyze and interpret security audits and communicate the results to stakeholders with a wide range of technical knowledge.
Collect evidence and artifacts to fulfill contractual and compliance requirements.
Monitor and track security patches for various software and systems.
Coordinate with different teams to ensure timely deployment of patches and updates.
Assist in incident response activities related to security vulnerabilities.
Investigate and analyze security incidents to support remediation efforts.
Maintain detailed documentation of vulnerability assessment findings and remediation efforts.
Prepare and present reports to management on the overall security posture.
Supervision/Autonomy
Able to independently set direction and scope of work. Able to evaluate the work of others and make decisions that affect personal or team productivity within a well-defined area of responsibility.
Planning/Organization
Able to organize incoming requests for work from multiple sources and plan projects without well-defined goals, maintaining day to day productivity with few requests for help.
Process Management
Understands and follows established processes. Able to adapt to ongoing changes in processes, priorities, tasks, and workload. Able to help develop and define processes and process improvement for Applied Tech.
Communication
Strong written and verbal communication skills. Demonstrates clear and professional written communication that conveys confidence and competence. Able to explain complicated concepts with poise to large groups.
People Skills/Conflict Management
Strong interpersonal skills for effective interaction with clients, third parties, and teammates. Able to demonstrate confidence in high-pressure situations and resolve conflicts.
NOTE: This job description is not intended to be all-inclusive. Employees may perform other related duties as requested to meet the ongoing needs of the organization.