Home

URGENT: Cybersecurity Analyst at Houston, Texas, USA
Email: [email protected]
From:

Lovely Singh,

Tek Inspiration

[email protected]

Reply to:   [email protected]

Hi,

Hope you are doing great!!! 

Please share suitable profile

Role: Cybersecurity Analyst

Duration:6 Months

Location: Houston, Tx-remote

MOI:SKYP

Description:

This position supports the InformationRisk Strategy Management (IRSM) Vulnerability Management (VM) program reportingto the Vulnerability Management Team Lead. Responsibilities include managingthe vulnerability remediation process to ensure weaknesses identified throughvulnerability scanning and assessments / penetration tests along with anyemergency concerns are assigned to owners and tracked to resolution.

Responsible for analyzing information/data collected from vulnerabilityassessments and scans; and in conjunction with the IRSM risk managers, helpsrecommend mitigations in the form of policies, standards, and controls as theyapply to the major risk domains. This person will also support projectinitiatives to assess vulnerability of Chevrons IT assets.

In this role, you will have theopportunity to:

Support project initiatives toassess vulnerabilities in Chevrons IT assets and perform validation testing ofremediated vulnerabilities from business vulnerability assessments, as needed.

Gain foundational knowledge in cybersecurity and apply that knowledge towardremediation initiatives.

Build foundational skills in cybersecurity toolsets including infrastructureand application scanning, phishing campaigns, cloud access security broker, andother cross functional security tools.

Engage leaders across the enterprise to share results and gain commitment.

This role can be located in either Houston, remote, or hybrid. Candidates do not have to be in Houston, but are preferred to be inHouston, however.

Bachelors degree in InformationTechnology (IT), Computer Science, Engineering or equivalent experience.

Strong desire to grow capability to effectively analyze the results ofvulnerability scans and assessment results.

Experience will include interpreting results and providing remediationguidance.

The ideal candidate should have a fundamental understanding of the currenttactics, techniques, and procedures relating to cybersecurity.

Technical

- Demonstrated ability in vulnerabilitymanagement or related field such as penetration testing, SOC, or threatintelligence.

-Understanding of attacker mindset,exploitation, and how vulnerabilities are leveraged.

- Knowledge of Cybersecurity principles andvarious information security technologies (i.e., IDS/IPS, HIPS, DLP, firewalls,network engineering, database, etc.).

- In-depth experience with cybersecurityconcepts, vulnerability scanning tools, and other security techniques such asactive/passive reconnaissance, vulnerability identification, exploitation,phishing, social engineering, and command and control techniques.

- Broad understanding in one of the followinginformation technology areas used to support and manage the business (i.e.,web, networking, database, cloud, telephony, mobile, applications, etc.).

Domain Knowledge

- Must understand IT systems (Operating Systems,databases, and applications).

- Experience in one of the following areas: asystem administrator, application developer, programmer familiarity with MSWindows or UNIX/Linux operating systems.

- Strong desire to learn new tools andtechnologies highly motivated to apply that knowledge toward understanding andcommunicating the sources of vulnerabilities.

Communication

- Candidates should demonstrate strong verbal,written and presentation skills, as well as an ability to communicate technicalinformation to different audiences (management, non-technical, ITProfessionals, PCN Professionals). Able to engage and interview stakeholdersrequesting vulnerability management services to capture key information neededto effectively understand, clearly articulate, and document remediation plans.

***Responsibilities include managing thevulnerability remediation process to ensure weaknesses identified throughvulnerability scanning and assessments / penetration tests along with anyemergency concerns are assigned to owners and tracked to resolution.

Responsible for analyzing information/datacollected from vulnerability assessments and scans; and in conjunction with theIRSM risk managers, helps recommend mitigations in the form of policies,standards, and controls as they apply to the major risk domains. This personwill also support project initiatives to assess vulnerability of Chevrons ITassets.

REGARD

Lovely Singh

Keywords: information technology Texas
[email protected]
View all
Tue Jan 24 21:26:00 UTC 2023

To remove this job post send "job_kill 298764" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 17

Location: Houston, Texas