drjobs Threat Vulnerability Management yst ESH5564 العربية

Threat Vulnerability Management yst ESH5564

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Indianapolis, IN - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

What’s in it for you!
  • Tremendous career advancement opportunities!
  • Fitness Centers/Gym Subsidies and fitness trackers!
  • Health and wellness programs!
  • 401k company match!
  • Employee stock purchase plan!
  • Basic life insurance!
  • Very generous PTO plus 14 paid holidays!
  • PTO for volunteer work you are passionate about!
  • Comprehensive benefits package with dental and vision!
  • Pet Insurance!
  • Flexible spending accounts!
  • New Parents get 12 weeks of 100% PTO for birth or adoption!
  • Tuition reimbursement!
If that’s you let’s talk! Job Type : Contract to Hire Location : Indianapolis Indiana Pay : Great Pay! Job Description

What you will be doing:

  • Conduct regular vulnerability assessments across all IT assets using industrystandard tools.
  • Analyze and prioritize vulnerabilities based on risk impact and exploitability.
  • Collaborate with various teams to remediate identified vulnerabilities promptly.
  • Manage and oversee the patching process for Windows Server 2016/2019/2022 and Redhat Linux 7/8/9 operating systems ensuring that all systems are uptodate with the latest security patches.
  • Develop and implement patch management strategies ensuring minimal disruption to business operations.
  • Track and report on patch compliance across the organization.
  • Identify and track software that is approaching or has reached the end of service life.
  • Coordinate with application owners and IT teams to plan and execute the upgrade or replacement of EOL/EOS software.
  • Ensure that all EOL/EOS software is either decommissioned or upgraded to supported versions to maintain security compliance.
  • Monitor security alerts and incidents related to vulnerabilities and patch management.
  • Assist in the investigation and response to security incidents that involve unpatched systems or EOL/EOS software.
  • Provide recommendations for improving security posture and reducing vulnerability exposure.
  • Maintain accurate and detailed documentation of vulnerability assessments patch management activities and EOL/EOS software remediation efforts.
  • Generate reports for management highlighting the status of vulnerabilities patching and EOL/EOS software.
  • Contribute to the development of security policies and procedures related to vulnerability management.

Experience you will need:

  • Minimum of 3 years of experience in vulnerability management server OS patching and software lifecycle management.
  • Experience with vulnerability management tools (e.g. Nessus Qualys Rapid7).
  • Strong understanding of operating systems (Windows Linux) and their respective patching processes.
  • Familiarity with ITIL processes and change management.
  • Bachelors degree in Computer Science Information Technology Cybersecurity or a related field.
  • Relevant certifications (e.g. CISSP CEH CompTIA Security) are a plus.
Our client asked me to submit 3 great people within the next few days. We work directly with the hiring manager and can arrange interviews within a few days
#INDEH123

Employment Type

Full Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.