Cyber Command Vulnerability Management Specialist

🌍 Remote, USA 🎯 Full-time 🕐 Posted Recently

Job Description

The NYC Office of Technology and Innovation is seeking a Cyber Command Vulnerability Management Specialist Tasks • Research, analyze and brief management and team members on relevant Risk, CVE's, CVSS, Vector Strings, NVD, Mitre, attack vectors and mitigations for various technologies • Design, architect and build Rapid7 vulnerability management scanning infrastructure and tools • Manage, configure and conduct Vulnerability Management scans in Rapid7 across various networks • Conduct vulnerability management analysis through industry research, deep analysis, generating of reports and dashboards in Rapid7 to accurately assess and prioritize risk • Evaluate security vulnerabilities, assess risk and impact, develop mitigation strategies, and implement remediation • Present succinct technical briefings to team members and customers for Client research, risk assessment, CVE's, vendor hardware/software, industry trends • Create scripts utilizing Python, PowerShell and others to automate vulnerability management tasks • The ability to automate detection, reporting and tracking of vulnerabilities identified • Create deep analysis and reports around vulnerability management utilizing Rapid7 dashboards and reports, scripts, Excel and PowerPoint • Travel within NYC for various projects when necessary Mandatory Skills/

Experience: Candidates who do not have the mandatory skills will not be considered • At least 8 years of experience in Cybersecurity, including vulnerability management scanning tools, vulnerability assessments, attack surface management, scripting, vulnerability Client analysis, vulnerability management scan result analysis, Excel • Strong knowledge of CVE's, CVSS, Vector Strings, NVD, Mitre, attack vectors and mitigations • Experience with the design, architect and build of vulnerability management scanning infrastructure and tools specifically Rapid7; extensive hands-on experience conducting Rapid7 vulnerability scans across various networks; experience conducting Rapid7 vulnerability management analysis through reports and dashboards to accurately identify risk • Experience evaluating security vulnerabilities, assessing risk and impact, developing mitigation strategies, and implementing remediation • Experience conducting Client research around CVE's, vendor hardware/software vulnerabilities, and presenting succinct technical overviews to team members and customers • Extensive experience with scripting such as Python and PowerShell to automate vulnerability management tasks • Extensive experience with Excel, especially for performing data analysis through VLookup and Pivot Tables Desirable Skills/

Experience: • Provide oral and written reports on vulnerability risk to the team and possibly agencies' technical stakeholders • Ability to evaluate the current threat landscape that includes tactics, techniques and procedures • Work with agencies to evangelize the OTI Cyber Command program around areas of cybersecurity posture enhancement, risk reduction, attack surface management, vulnerability management scanning tool performance, scan results, credentialed scans, triage scan performance issues, socialize risk and remediation, and other vulnerability management issues • Experience using Tableau for reporting and analysis purposes • Strong background with next generation firewall products, intrusion detection systems, DMZ, IPSec, DNS, SMTP, HTTP, VPN, proxies, etc.

• Knowledge of security best practices across multiple platforms, such as bolthires Windows, VMWare, Linux, VPN, Cisco IOS, and Mobile OS Android/bolthires IOS. • Knowledge of public-key cryptography, understanding of encoding, encryption, and hashing techniques • Knowledge of security best practices: NIST, CIS, Cisco, Juniper, Palo Alto, Fortinet, Checkpoint, F5, bolthires, Unix/Linux, etc. • Ability to analyze Cybersecurity documentation, including security policies, plans, and procedures. • Extensive experience with Windows and Linux Servers • Exceptional written and oral communication skills • Exceptional organizational and analytical skills • Certifications such as Certified Information Systems Security

Professional (CISSP) Certification, Security Essentials Certification (GSEC), Certified Intrusion Analyst (GCIA), Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), Certified Penetration Tester (CWAPT) Work hours and location: • Normal Business Hours, Monday through Friday (not including a mandatory unpaid meal break after 6 hours of work), 35 work hours per week.

• Hybrid: 3 days per week in office at 11 MetroTech Center, 5 th Floor, Brooklyn, NY 11201 / 2 days per week remote Spruce Technology, Inc. is a mid-size, award-winning (Inc 5000, SmartCEO, Entrepreneur of the Year) technology services firm with a steadily growing portfolio of commercial and government clients. Spruce provides innovative technology solutions, specialized IT staff, and IT strategy consulting nationwide. Spruce maintains partnerships with major technology vendors and continually develops leading-edge offerings in service areas such as digital experience, data services, application development, infrastructure, cyber security, and IT staffing.

Spruce Technology, Inc. is an affirmative action and equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, veteran status, or genetic information. Consistent with the Americans with Disabilities Act, it is the policy of Spruce Technology, Inc. to provide reasonable accommodation when requested by a qualified applicant or employee with a disability, unless such accommodation would cause an undue hardship.

The policy regarding requests for reasonable accommodation applies to all aspects of employment, including the application process. Apply tot his job

Ready to Apply?

Don't miss out on this amazing opportunity!

🚀 Apply Now

Similar Jobs

Recent Jobs

You May Also Like