Security Engineer - Vulnerability Management at Mountain View, California, USA |
Email: ryan@nityainc.com |
https://jobs.nvoids.com/job_details.jsp?id=2267418&uid= From: Nitya, Nitya software solution ryan@nityainc.com Reply to: ryan@nityainc.com Role: Security Engineer - Vulnerability Management Location: Mountain View CA (100% Onsite) Remote NOT allowed C2C Security Engineer - Vulnerability Management Role | Must-Have Skills (Non-Negotiable) - Vulnerability Management. 1. Proficient in Analyzing and prioritizing security vulnerabilities based on risk. 2. Proficient in Developing mitigation strategies and remediation plans. 3. Must be able to use environmental and threat intelligence for vulnerability analysis. 4. Experience in Securing environments in AWS, GCP, Docker, Kubernetes. 5. Proficient in Python, Java, Ruby, Node for security automation. 6. Experience with Tableau, Qlik Sense, SQL for security insights. Good-to-Have Skills (Preferred but Not Mandatory) - Vulnerability Management. 1. Experience mitigating WAF evasion techniques. 2. Ability to influence engineering teams for secure coding practices. 3. Use AI-driven analytics for vulnerability detection and response. 4. Knowledge of security frameworks and regulatory compliance. | DETAILED JOB DUTIES Skill Set for Security Engineer - Vulnerability Management Role Must-Have Skills (Non-Negotiable) Vul. Mgmt Identify, Analyze, and Prioritize the Impact of Vulnerabilities Assess and prioritize vulnerabilities based on real-world impact. Examples: Using risk-based factors beyond CVSS, incorporating threat intelligence and environmental factors. Tools: OWASP, SANS 25, AWS Security Hub, Tableau, Qlik Sense for risk assessment. Mitigation if Patch is Not Ready Implement compensating controls and temporary mitigations for unpatched vulnerabilities. Examples: Using WAF rules, network segmentation, access controls until a patch is available. Tools: AWS, Kubernetes, Docker Security Measures, Advanced WAF Configurations. Automating Future Detection Develop and implement automated detection mechanisms for vulnerabilities. Examples: Automating scans, continuous vulnerability assessment, and reporting. Tools: Python, Java, Ruby, Node, AWS Security Hub, JIRA, ServiceNow. Detecting Malicious Payloads Identify and prevent malicious payloads before execution. Examples: Using threat intelligence and behavioural analytics for payload detection. Tools: CrowdStrike, AWS GuardDuty, SIEM solutions. Blocking Advanced WAF Evasion Techniques Enhance Web Application Firewall (WAF) security to detect and block advanced evasion attempts. Examples: Implementing custom WAF rules and monitoring attack patterns. Tools: AWS WAF, Cloudflare, ModSecurity, Imperva. Automating Threat Responses Automate incident response workflows for detected vulnerabilities. Examples: Using security playbooks to trigger automated remediation actions. Tools: AWS Lambda, Python automation, SIEM integrations. Risk-Based Factors Beyond CVSS Consider additional risk factors beyond CVSS scores when prioritizing vulnerabilities. Examples: Evaluating exploitability, business impact, attack surface exposure. Tools: Threat intelligence feeds, vulnerability management dashboards. Good-to-Have Skills (Preferred but Not Mandatory) Vul. Mgmt Cloud Security & Container Security Secure AWS, GCP, Kubernetes, Docker environments. Data Analytics for Security Posture Improvement Utilize Tableau, Qlik Sense, SQL for security data analysis. Experience in Influencing Secure Software Development Work with developers to build security-first applications. Keywords: artificial intelligence California Security Engineer - Vulnerability Management ryan@nityainc.com https://jobs.nvoids.com/job_details.jsp?id=2267418&uid= |
ryan@nityainc.com View All |
06:37 PM 19-Mar-25 |