Consultant, Vulnerability Scanning and Tools
What you’ll achieve
The Vulnerability Management Consultant will be responsible for leading the design and deployment of vulnerability scanning solutions across the enterprise; participating in the creation, review and maintenance of current and proposed processes and procedures and related documentation within vulnerability scanning and tools team; and planning and executing vulnerability and compliance scans across the IT infrastructure and product environments.
You will:
Ensure an active assessment capability across all Dell networks and infrastructure together with IT and engineering teams to improve the capability and quality of scanning activities where necessary
Collaborate with other members of the scanning team on daily issues, diagnose and resolve scanner software problems, and restore normal operation
Adapts and evolves vulnerability scanning processes and procedures based on internal customer or business partner feedback.
Develops and implements automated and continues scanning techniques to better support IT and application teams
Exhibits good understanding of vulnerability validation,
- production, and remedy advice and vulnerability research skills.
Cultivates the practice of staying abreast on latest trends and developments in vulnerability scanning tools and solutions, threat intelligence and remediation activities followed across industry
Contributes to the vulnerability scanning and tools program through delivery of end results and contribution to future planning based on industry evolution and internal IT and application teams’ requirements
Take the first step towards your dream career
Every Dell Technologies team member brings something unique to the table. Here’s what we are looking for with this role:
Essential Requirements
In-depth technical experience with any of the enterprise scanning tools (Nexpose, Tenable IO, Qualys, Prisma, etc. )
Experienced in containers and container security, Knowledge of Cloud architecture and cloud environments such as AWS, GCP, and Azure , plus a Good understanding of Kubernetes.
Ability to understand and consult on CIS and DISA STIG benchmarks
Knowledge of compliance methodologies and understanding of Agile methodologies
Understanding and knowledge of OWASP tools and methodologies and security attack vectors
Experience invulnerability management, threat, or penetration testing
Experience with programming and scripting languages (such as Python, Java Script etc. )
Desirable Requirements
A degree in Information Technology, Information Security or related major and 6-8 years of direct experience in the field of cybersecurity.
CISSP or similar certification is advantageous.
Fii primul, care se va înregistra la oferta de muncă respectivă!
-
De ce să cauți de muncă pe Lucrezi.ro?
În fiecare zi oferte noi de muncă Puteți alege dintr-o gamă largă de locuri de muncă: Scopul nostru este de a oferi o gamă cât mai largă de opțiuni Lasă să-ți fie trimise noile oferte prin e-mail Fii primul care răspunde la noile oferte de muncă Toate ofertele de muncă într-un singur loc (de la angajatori, agenții și alte portaluri) Toate serviciile pentru persoanele aflate în căutarea unui loc de muncă sunt gratuite Vă vom ajuta să găsiți un nou loc de muncă