Data Security Analyst - Vulnerability Management
<p><strong><em>Job Description:</em></strong></p><p><br></p><p>The Threat & Vulnerability Management Team (TVM) are within the SOC function managing vulnerabilities. The Security Operations Center (SOC) are responsible for protect, detect, response, and remediation of all security alerts. </p><p>The L2 specialist will report to the TVM Team Shift Manager for all daily tasks and provide reports each week. </p><p><br></p><p><strong><em>Responsibilities:</em></strong></p><p><br></p><ul><li>Continuously monitor Qualys Console/Pods and for health status and confirm console availability.</li><li>Perform vulnerability scans on endpoints, workstations, network assets (internal and external).</li><li>Perform risk analysis on all vulnerabilities and confirm the requirement for action.</li><li>Create tickets for remediation teams and escalate where & when appropriate.</li><li>Collate Threat Intel, log events & artifacts to update the specific ticket for each alert investigation.</li><li>Provide clear summary and handover when/if necessary, on all escalations to Team Lead or SOC Manager.</li><li>Provide clear investigative reports when requested for analysis of specific vulnerabilities.</li><li>Identify trends in and risks across the enterprise.</li><li>Refer to TVM playbooks & InfoSec procedures, standards, and policies to understand the business requirements.</li><li>Monitor the mailbox and message platforms for internal and external escalations from stakeholders.</li><li>Manage tickets until remediation, using the escalation path to handoff where applicable to meet the SLA.</li></ul><p><br></p><p><strong><em>Desired Skills:</em></strong></p><p><br></p><ul><li>Knowledge and/or experience with security vulnerability assessment tools: Qualys, Tenable Nessus etc.</li><li>Network & Server technologies, OSI stack, network protocols, WAS, DAST & SAST, SDK. </li><li>Minimum of 2 years of experience in Risk & Vulnerability Analysis</li><li>Prior experience of working within an enterprise, understanding IR processes, Malware analysis is a bonus.</li><li>Prior experience in SIEM technologies & security tools: QRadar, FireEye, Sentinel One, Microsoft Defender, etc.</li><li>Ability to follow procedures and guidelines, seek clarity whenever unsure of the exact objective or requirement.</li><li>Ability to prioritize tasks when unsupervised, ability to identify the highest risk when monitoring alerts.</li><li>Triage of phishing emails, identifying risks, and communicating them effectively.</li><li>Professional and technical oral and written communication.</li><li>Collaborative team player, focused on one team, one goal.</li><li>Should be able to cover EST business hours, Monday to Friday</li><li><strong><em>Direct report:</em></strong></li><li>The position reports to the TVM Shift Manager</li></ul><p></p>