Top Skills
- Provide risk-based mitigation strategies for networks, operating systems and applications including technical remediation steps
- Experience in Vulnerability Management scanning tools such as Rapid7, Qualys or Nessus
- Inform various team of active threats, zero-day vulnerabilities and exploits in the wild that can have a direct impact on operations
- Must be willing to learn PostgreSQL or already have experience in any SQL platform
- Must be willing to identify security risks, and develop mitigation strategies and proposals for leadership
- Must be familiar with Cyber Security Fundamentals (familiarity with key concepts of vulnerability management, Network Security/Secure transmission management, Data Loss Prevention, Identity Access Management, Threat Intelligence, Penetration Testing, IT Risk Management)
- Have a good understanding of networks, DMZs, load balancers, and firewalls
- Have a good range of knowledge of different types of assets connected to the network and what they do, their security issues and/or willing to learn about them
- Be able to produce creative solutions to deal with roadblocks from managers, application owners, vendors, etc
- Being able to lead initiatives like priority0, emergent threat, etc.
- Great deal of knowledge with analyzing the technical details and inner workings of vulnerabilities to determine where and when they apply, and where false positives may occur.
- Need a "Bulldog" mentality