Analyze and manage security technologies to provide detective and preventative capabilities (Vulnerability Scanning, endpoint security, intrusion detection, network forensics, network, and application security and security, and event/incident management).

More Uses of the Vulnerability Scan Toolkit:

  • Initiate: monitor application and network vulnerabilities for potential security concerns; develop mitigation strategies; and execute mitigation tactics.
  • Attempt to have the system owner remove the unauthorized wireless network on the spot and provide a monthly report with detailed findings of the wireless scan and actions taken to remove the unauthorized wireless network.
  • Liaise with third party security consultant groups to execute third party scanning and pen testing activities as defined by industry regulation.
  • Pilot: effectively collaborate and communicate with development, devops, saas security, executive management and lines of business to report trends and status.
  • Resolve system problems by analyzing the problem for resolution paths, implementing solutions, and/or working with vendors to resolve issues.
  • Manage: tenable nessus Vulnerability Scanner or similar Vulnerability Scanner security tool for reporting and re mediating system vulnerabilities.
  • Initiate: continuously perform Vulnerability Scanning, risk analysis and security assessments to detect any product vulnerabilities and develop and implement intrusion detection controls to prevent any intrusions into your systems.
  • Confirm your organization ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of Vulnerability Scanning devices.
  • Manage: customer point of contact for identifying, defining/implementing cybersecurity strategies, policies/tactics, techniques and procedures.
  • Manage work with it team to establish procedures for monitoring and responding to casb alerts, in an analogous manner to vulnerability reports.
  • Devise: work closely with Security Program Manager to coordinate and remediate penetration testing, application testing, Vulnerability Scans, and system configuration management projects.
  • Coordinate with development and field support teams for the release and maintenance of new versions of software product and Support new and existing system interfaces.
  • Ensure you engage with your peers, the industry and experts to stay current on research, threats, and innovation to drive the right directions and strategies from a security infrastructure perspective.
  • Develop, configure, and implement day to day Vulnerability Scan to detect, analysis, remediate, and prevent exploitation of on network endpoints.
  • Devise: secure enterprise information by determining security requirements, evaluating business needs, and adhering to federal and industry security standards.
  • Devise: integration of security requirements and design review into sdlc and driving remediation of application Vulnerability Scanning and penetration testing tasks.
  • Support internal Vulnerability Scanning and external penetration testing activities, using advanced analytic tools to determine emerging threat patterns and vulnerabilities.
  • Systematize: review security plans for compliance with appropriate organization Orders, Manuals or Directives and make recommendations to ensure security plan requirements.
  • Engage in organizational security assessments, data classification, business continuity planning, Vulnerability Scanning, and penetration testing projects.
  • Devise: review and process monthly Vulnerability Scan results for assigned systems and work with the technical teams to ensure vulnerabilities are resolved on time.
  • Evaluate, implement and maintain Microsoft technology, security updates, hot fixes, upgrades and version releases to ensure architecture stability.
  • Perform formal security assessments to determine whether security controls are in place, operating as intended, and producing desired results.
  • Evaluate: monitor the systems for possible system problems, analyze the problem for resolution paths, implement solutions, and or work with vendors to resolve issues.
  • Confirm your organization assess vulnerabilities to ascertain if additional safeguards are needed and ensure systems are patched and security hardened at all levels of the stack, and monitor to ensure vulnerabilities are remediated as appropriate.

 

Categories: Articles