Vulnerability Engineer Resume Samples

4.9 (99 votes) for Vulnerability Engineer Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the vulnerability engineer job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
OH
O Harvey
Ofelia
Harvey
61183 Paul Burgs
Los Angeles
CA
+1 (555) 484 5243
61183 Paul Burgs
Los Angeles
CA
Phone
p +1 (555) 484 5243
Experience Experience
Detroit, MI
Vulnerability Remediation Engineer
Detroit, MI
Weimann-Morissette
Detroit, MI
Vulnerability Remediation Engineer
  • Assist the Client by providing SME assistance, and root-cause analysis on vulnerabilities
  • Work through prioritized vulnerabilities for patch remediation with respective asset owners
  • Assist in reporting asset changes through Client’s technology, and processes
  • Additionally, provide
  • Learn and adapt to Client’s culture, security strategies, security goals, security objectives, and security capabilities
  • Advisory in prioritization of patch deployment
  • Classify and prioritize the risk of all vulnerabilities taking into consideration mitigating factors and impacts of internal and external threats
Boston, MA
Cybersecurity Vulnerability Engineer
Boston, MA
Brown Inc
Boston, MA
Cybersecurity Vulnerability Engineer
  • Providing solutions to recommendations for security issues and vulnerabilities identified during assessments
  • Strong familiarity with networking, operating systems, databases, and applications
  • Deliver regular reporting to security leadership on remediation efforts
  • Consulting background is a plus
  • Develop a continuous monitoring approach to regularly measure and report the status of the following control areas: patching, hardening, audit and log config, authentication mechanisms
  • Validate the remediation of identified issues using tools, manual techniques, and where necessary, relevant SME’s
  • Knowledge of information security hardening guidelines such as CIS or DoD guidelines
present
Los Angeles, CA
Vulnerability Risk Senior Engineer
Los Angeles, CA
Kuhic and Sons
present
Los Angeles, CA
Vulnerability Risk Senior Engineer
present
  • Develop risk management database to effectively capture residual risks and exceptions while assessing the likelihood of impact to the environment
  • Report compliance risk levels, identify non-compliance issues, security vulnerabilities, and manage remediation activities
  • Stay current on security industry trends, attack techniques, mitigation techniques, security technologies and new and evolving threats to the organization by attending conferences and networking with peers
  • Effectively communicate security gaps with remediation recommendations to management
  • Develop roadmap to remediate security gaps in coordination with cross functional groups
  • Lead cross functional effort to assess security measures, identify and remediate vulnerabilities
  • Document procedures to validate compliance with security standards through routine self-audits
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Loyola University Chicago
Bachelor’s Degree in Computer Science
Skills Skills
  • Knowledge of ballistic damage to rotorcraft structure, ballistic threat capability, S/V assessments, and armor design strategies is
  • Basic level proficiency with Active Directory and Exchange
  • Familiarity with cutting edge trends in vulnerability analysis, exploit development and vulnerability discovery
  • Advanced knowledge of the IT security field with an understanding of various vulnerability assessment techniques and tools
  • Ability to adapt existing exploits or advisories into robust exploits specific to the Bloomberg environment
  • Experience assessing and hardening Active Directory and Group Policy and knowledge of cutting edge security features of Microsoft Windows
  • Intimate knowledge of Windows internals, especially those relevant to authentication and access control and other facets of security
  • Ability to read, write, and audit C or C++
  • Proficiency in at least one scripting language (bash, perl, python, powershell, etc.)
  • Foster company success through a professional appearance, being courteous to customers and all Scottrade associates and by having a positive attitude
Create a Resume in Minutes

15 Vulnerability Engineer resume templates

1

Vulnerability Mitigation Engineer Resume Examples & Samples

  • 2+ years of experience with network vulnerability assessments, Web application security testing, and penetration testing
  • Experience with using, administering, and troubleshooting at least two major types of Linux or UNIX, including Red Hat, SUSE, AIS, or Solaris
  • Experience with using, administering, and troubleshooting multiple versions of Windows operating systems in an Active Directory environment
  • Experience with security scanning tools, including Nessus or security center
  • Experience with conducting penetration testing
  • BS degree in Computer Engineering or CS
2

Vulnerability Mgmt Scanning & Pentest Engineer Resume Examples & Samples

  • Configures, runs, and reports on vulnerability scans of network attached devices. 40%
  • Provides consulting and guidance to technical and business personnel on vulnerability remediation. 20%
  • Monitors and reports on remediation efforts for compliance to vulnerability management standards. 20%
  • Assists with penetration testing and red team activities. 20%
  • Bachelor's degree in Computer Science, business, or related field; equivalent experience is acceptable or equivalent education and related training
  • Two years’ experience performing network security functions
  • Technical skills will include; in-depth understanding of vulnerability management, penetration testing, network security issues, firewalls, intrusion detection, authentication, hacker tools and methodology, current network operating systems, routing, incident response, and process development
3

IT Threat & Vulnerability Engineer Resume Examples & Samples

  • Bachelor degree in Cybersecurity, Information Security, Information Assurance, IT Audit, Computer Science, Management Information Systems or related discipline
  • Minimum 3 years IT Security related experience, Financial Services experience a plus
  • Must have at least one security or IT related professional designation. CISSP, CISA or CISM preferred
  • Proficient in Microsoft Outlook and Microsoft Office Suite. Experience with vulnerability scanners and vulnerability management systems and well versed in various information technology systems and services
  • Familiarity of security control environment (access control, logging, authentication, encryption, integrity, etc.); Experience coordinating corporate-wide initiatives for obtaining security related assurances
  • Familiarity with federal and state legal regulatory requirements related to information security. Understands the basic tenants of security risk management (threat management, vulnerability management, and risk treatment)
  • Communicates effectively in writing as appropriate for the needs of the audience
4

Senior Vulnerability Engineer Resume Examples & Samples

  • Monitor the NIST National Vulnerability Database for vulnerability announcements, patch and non-patch remediation, and emerging threats that correspond to the software within the system inventory
  • Manage the vulnerability scanning infrastructure, services, schedules and reporting processes. Troubleshoot most known and new vulnerabilities to determine the root cause, and provide solutions to foster the initiative through. Escalate vulnerabilities that require risk assessment or alternate mitigation strategies to determine enterprise mitigation requirements
  • Work with customers, regulations, and security audits to create operational security solutions and policies
  • Review new application architecture and application settings for applications to ensure compliance with security standards
  • Influence security policies at an organizational level
  • Manage and improve the security exception process
  • Participate in the vulnerability response process when high severity vulnerabilities are detected
  • BA/BS in Engineering, Computer Science, Information Security, or Information Systems or equivalent related work experience
  • Minimum of 5 years of experience in information technology in either development or operations
  • Familiarity with scripting in at least one of the following: Linux/bash, Windows Powershell, perl
  • Experience with Apache, Jira, Weblogic, SQL, Tomcat, MQ, Tibco is a plus
  • Experience with Qualys products is a plus
  • Knowledge of web tier architecture and F5 is a plus
  • Familiarity with CVSS scoring and security standards
5

Vulnerability Assessment Engineer Resume Examples & Samples

  • Three years’ experience conducting security assessment or working in vulnerability management
  • Three years’ experience with one or more of the following or similar products: Tanium, Symantec Endpoint Protection, McAfee AV, SCCM, Bromium, Avast AV
  • Three years’ experience producing technical documentation, spreadsheet reports, and visual presentations
  • Three years’ experience in an Enterprise environment
  • Excellent problem solving/analytical skills
  • Ability to clearly communicate status and action plans to key stakeholders
  • Bachelor’s Degree in IT, Computer Science or equivalent work experience
  • CISSP or other security certifications a plus
6

Cybsec Vulnerability Aassessment Engineer Resume Examples & Samples

  • Candidates will conduct Unit directed vulnerability and/or Compliance assessments
  • Candidates will support Unit accreditation efforts of systems and applications through the FBI’s SAA process
  • Candidates will also support the Risk Vision GRC Team in establishing an automated FISMA compliance capability, by using RISK Vision Connectors to capture vulnerability scan results for automated reporting
  • Be experienced in performing enterprise-level assessment scanning of Networks, databases, and Web Applications
  • Be comfortable configuring and performing host, ports and services discoveries on large enterprise networks, and identify target operating systems and applications/services based on discovery scan results
  • Be comfortable using, configuring, troubleshooting, and administering Tenable Security Center, Tenable Nessus (standalone), AppDetective, and Web Inspect
  • Have the ability to think critically and creatively. Capable of synthesizing and analyzing large amounts of scan data
  • Ability to articulate thoughts and findings in a concise and comprehensive manner
  • 05-07 years w/Bachelors Degree
7

Junior Vulnerability Assessment Engineer Resume Examples & Samples

  • Candidates will conduct quarterly automated scans and analysis of enterprise-class information systems, to include discovery scans, compliance scans, and vulnerability scans
  • Candidates will coordinate and perform all scanning, analyze scan data, and prepare vulnerability reports for information systems
  • Candidates will also document test results in accordance with FBI regulations and VAT SOPs
  • Candidates must be able to perform Vulnerability and Compliance assessments on devices identified during enterprise network scans, including: Operating systems, Oracle and MySQL Databases, or Web applications
  • The candidate should be comfortable using enterprise-class network scanning tools such as: (Tenable Nessus, Tenable Security Center), database scanning tools (AppDetective and DbProtect) and Web scanning tools (Web Inspect), and should be knowledgeable about the security best practices and most common vulnerabilities that exist for each of these technologies, including SANS and OWASP Top 10
  • Be experienced in performing enterprise-level assessment scanning of Networks, databases, or Web Applications
  • Have experience with some open source and commercial testing tools. A non-comprehensive list includes Nessus, NMAP, App Detective, Hailstorm, Guardium, and Web Inspect
  • Be comfortable using, configuring, troubleshooting, or administering Tenable Security Center, Tenable Nessus (standalone), AppDetective, or Web Inspect
  • Have some understanding of the security policies used by intelligence organizations, as well as security guidelines published by the National Institute of Standards (e.g., 800-53 rev 4 and 800-53a)
  • Have the ability to think critically and creatively. Capable of analyzing large amounts of scan data
  • Ability to articulate thoughts and findings in a concise manner
  • Requires Associates degree or five years of IT experience and three years of IT Security experience
8

Senior Vulnerability Engineer Resume Examples & Samples

  • 7+ years of experience in a hands-on technical security engineering role focused on vulnerability management
  • Experience with security automation
  • Experience designing/implementing scanning architecture in an enterprise environment
  • Must have background, experience, and understanding of networking and network security technologies such as Firewalls, IDS/IPS, Proxies, Content Filtering, Application security, SIEM and Log, monitoring/management, Vulnerability Management, Risk and Compliance
9

Cybsec Vulnerability Assessment Engineer Resume Examples & Samples

  • Candidate will manage and lead quarterly automated scans and analysis of enterprise-class information systems, to include discovery scans, compliance scans, and vulnerability scans
  • Candidate will manage and lead Unit directed vulnerability and/or Compliance assessments
  • Candidate will provide support for Unit accreditation efforts of systems and applications through the FBI’s SAA process
  • Candidate will provide support to the Risk Vision GRC Team in establishing an automated FISMA compliance capability, by using RISK Vision Connectors to capture vulnerability scan results for automated reporting
  • Candidate will manage VAT scan schedule to ensure all scan coordination, scanning, analysis of scan data, and vulnerability reports for information systems are performed and completed on time
  • Candidate will also document test results in accordance with FBI regulations and VAT SOPs
  • Candidate must be able to demonstrate ability to lead and perform Vulnerability and Compliance assessments on all devices identified during enterprise network scans, including: Operating systems, Oracle and MySQL Databases, and Web applications. The candidate should be comfortable configuring, using, and managing enterprise-class network scanning tools such as: (Tenable Nessus, Tenable Security Center), database scanning tools (AppDetective and DbProtect) and Web scanning tools (Web Inspect), and should possess a broad knowledge about the security best practices and most common vulnerabilities that exist for each of these technologies, including SANS and OWASP Top 10
  • Be experienced managing enterprise-level assessment scanning of Networks, databases, and Web Applications
  • Be comfortable leading host, ports and services discoveries on large enterprise networks, and identifying target operating systems and applications/services based on discovery scan results
  • Have experience with open source and commercial testing tools. A non-comprehensive list includes Nessus, NMAP, App Detective, Hailstorm, Guardium, and Web Inspect
  • Be comfortable installing, configuring, troubleshooting, and administering Tenable Security Center, Tenable Nessus (standalone), AppDetective, and Web Inspect
  • Have a solid understanding of the security policies used by intelligence organizations, as well as security guidelines published by the National Institute of Standards (e.g., 800-53 rev 4 and 800-53a)
10

Vulnerability Systems Solutions Engineer Resume Examples & Samples

  • Operate McAfee ePO and McAfee Vulnerability Manager (MVM) or similar products to execute vulnerability scans and generate reports
  • Perform functional analysis, timeline analysis, trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications
  • Confer with clients regarding the nature of the system vulnerabilities and recommended remediation steps
  • Perform risk assessments against customer systems leveraging scan tools like NESSUS
  • Provide staff and users with assistance in solving computer related problems, such as malfunctions and program problems
  • Test and monitor computer systems, including coordinating the installation of computer programs and systems
  • Conduct root-cause analysis of noted system performance issues
  • Develop analytical and computational techniques and methodology for problem solutions
  • Tests, debugs, and assists in the refinement of system products
  • Prepare required documentation, including both program-level and user-level documentation
  • Apply business process improvement practices to re-engineer methodologies and principles and business process modernization projects
  • Apply, as appropriate, activity and data modeling, transaction flow analysis, internal control and risk analysis and modern business methods and performance measurement techniques
  • Assist in establishing standards for information systems procedures
  • Construct sound, logical business improvement opportunities consistent with the CIM guiding principles, cost savings, and open system architecture objectives
11

Vulnerability Remediation Engineer Resume Examples & Samples

  • Perform hands-on security vulnerability remediation on operating systems, databases, web-based applications and security appliances
  • Comprehensive understanding of the different stages of remediation in different operating environments
  • Collaborate with various teams (IT, Operations) to help ensure implementations meet security standards
  • Provide technical support to system owners and 3rd party vendors by providing mitigation and remediation solutions to identified issues
  • Perform patching and system security configuration remediation
  • Strong systems and network background with an emphasis in secure configuration, hardening and patching
  • Coordinate all remediation activities with project leads
  • Proven strong technical and vulnerability remediation skills across systems, databases, applications and infrastructure
  • Demonstrate analytical skills, technical knowledge and practical application of cyber and information security principles
  • Industry Certifications preferred: GIAC, CISSP
  • Generally requires 5-8 years of experience in remediation role
12

Vulnerability Risk Senior Engineer Resume Examples & Samples

  • Maintain compliance of Comcast vulnerability management policy and assist the organization in implementing security policy objectives
  • Subject matter expert in vulnerability and risk management for applications, web architectures, operating systems, databases and the entire infrastructure
  • Experience analyzing network, application and web vulnerability assessments and penetration test reports
  • Classify and prioritize the risk of all vulnerabilities taking into consideration mitigating factors and impacts of internal and external threats
  • Work closely with project leads to coordinate, plan and successfully execute vulnerability remediation
  • Lead cross functional effort to assess security measures, identify and remediate vulnerabilities
  • Develop roadmap to remediate security gaps in coordination with cross functional groups
  • Effectively communicate security gaps with remediation recommendations to management
  • Report compliance risk levels, identify non-compliance issues, security vulnerabilities, and manage remediation activities
  • Maintain dashboards, create, collect and report vulnerability/risk security metrics, remediation compliance and residual risks to management
  • Develop risk management database to effectively capture residual risks and exceptions while assessing the likelihood of impact to the environment
  • Document procedures to validate compliance with security standards through routine self-audits
  • Provide recommendations for continual improvement of vulnerability management integration, processes and technical assessment reports
  • Interface with audit organizations internally and externally as needed
  • Exceptional communication and advocacy skills, both verbal and written, with the ability to express complex technical issues in an easily understood manner
  • Ability to collaborate and communicate effectively and respectfully
  • Must be organized, have a strong attention to detail and work independently
  • Stay current on security industry trends, attack techniques, mitigation techniques, security technologies and new and evolving threats to the organization by attending conferences and networking with peers
  • Report to Security Manager and provide day-to-day direction to security vulnerability engineer
  • Bachelor's degree in Computer Science, Information Assurance, or a related degree or equivalent experience
  • Industry Certifications preferred: GIAC, CISSP, CISM, CISA
  • Generally requires 7-11 years of experience in an Cyber Security related role
13

Senior Vulnerability Engineer Resume Examples & Samples

  • Create and perform complex vulnerability assessments and penetration tests to identify and verify vulnerabilities
  • Assist system owners with planning remediation efforts within different Scottrade environments
  • Consult with management on security matters and projects where security controls should be employed
  • Assist with identifying gaps in technology and vulnerability management processes. Assist with the development and maintenance of vulnerability management work plan as it relates to Scottrade infrastructure
  • Assist, mentor and train department associates on vulnerability assessment, threat awareness and remediation
  • Intermediate level proficiency with Microsoft Word, Excel, and Outlook
  • Foster company success through a professional appearance, being courteous to customers and all Scottrade associates and by having a positive attitude
  • Bachelor’s degree in IS, Computer Science, MIS Management, or related field, or equivalent combination of education and experience required
  • 6+ years experience in information/network security required
14

Vulnerability Engineer Resume Examples & Samples

  • Create, document and present metrics on current vulnerabilities and remediation efforts
  • Prepare functional and technical specifications for security related projects
  • Advanced knowledge of the IT security field with an understanding of various vulnerability assessment techniques and tools
  • Advanced understanding of the OSI model and how to identify targets and vulnerable points of attack within the model
  • Advanced understanding of security concepts such as least privilege, privilege escalation, and defense in depth
  • Advanced level ability to identify and explain various network security vulnerabilities and how to avoid them in a variety of networks
  • Advanced understanding of secure communications and encryption technologies
  • Ability to create and manage security metrics
  • Exceptional organization and communication skills with a focus on collaboration and multi-tasking
  • Basic understanding of Cisco routers and switches
  • Basic level proficiency with Active Directory and Exchange
  • 4+ years experience with security penetration testing required
  • SANS certifications and CISSP preferred
15

Vulnerability Engineer Resume Examples & Samples

  • Secret Security Clearance or higher or the ability to obtain a security clearance is required to accomplish work activities. Most programs require US Citizenship
  • Familiarization with vulnerability assessment practices and analytical methods to assess rotorcraft systems is required
  • Understanding of systems engineering processes and requirements develop is required
  • Experience in computer applications to solve engineering problems and process data is required
  • CATIA or relevant CAD tool experience
  • Experience with loads and rotary wing knowledge
  • Knowledge of ballistic damage to rotorcraft structure, ballistic threat capability, S/V assessments, and armor design strategies is a plus
  • General background in rotorcraft educational studies is preferred
16

Vulnerability Scanning & Remediation Engineer Resume Examples & Samples

  • Responsible for working with DSW’s VMS Dedicated Team Architect to assist with understanding threat data and vulnerabilities found on client’s network
  • Learn and adapt to client’s culture, security strategies, security goals, security objectives, and security capabilities
  • Maintain knowledge of outstanding vulnerability management issues as it pertains to the Client’s DSW Vulnerability Management Service and communicate updates to Client as appropriate
  • Perform manual validation of findings using tools like OpenSSL, ikescan, Burp, etc
  • Provide technical authority, vision, documentation of operational procedures and guidance to ensure the continued evolution of Dell SecureWorks Managed Vulnerability offerings
  • 2+ years of experience in a technical security support role
  • Network engineering experience with Linux/Unix - Windows and network infrastructure administration
  • Experience with Vulnerability management platforms such as QualysGuard, nCircle IP360, Rapid 7
  • Strong technical, analytical, and interpersonal skills; ability to motivate and inspire team members
  • QualysGuard Certified Specialist
17

Vulnerability Remediation Engineer Resume Examples & Samples

  • At least 2 years experience with the design, development and support of technology infrastructure
  • At least 5 years experience within a total information technology (IT) environment
  • Information security management
  • IT systems management
18

Cybersecurity Vulnerability Engineer Resume Examples & Samples

  • Drive vulnerability remediation efforts for identified issues on systems, devices, and network devices with system owners
  • Providing solutions to recommendations for security issues and vulnerabilities identified during assessments
  • Validate the remediation of identified issues using tools, manual techniques, and where necessary, relevant SME’s
  • Develop a continuous monitoring approach to regularly measure and report the status of the following control areas: patching, hardening, audit and log config, authentication mechanisms
  • Assess the risk of technical security vulnerabilities and configuration issues, utilizing known threats, vulnerability information, system exposure, and mitigating controls
  • Develop relationships with IT stakeholders to facilitate remediation of security issues
  • Deliver regular reporting to security leadership on remediation efforts
19

Vulnerability Assessment Engineer Resume Examples & Samples

  • 0-2 years of technical experience and a BS degree in technical area such as Computer Science or Engineering
  • Ability to obtain a TS/SCI + Polygraph clearance
  • Hands on Information Security experience
20

Cybersecurity Vulnerability Engineer Resume Examples & Samples

  • 2+ years of experience with IT or Cybersecurity
  • Experience with vulnerability scanning
  • DoD 8570.01 IAT Level II Certification, including Security+
21

Vulnerability Remediation Engineer Resume Examples & Samples

  • Responsible for understanding, reviewing, and interpreting SecureWorks’ assessment and scanning results
  • Work through prioritized vulnerabilities for patch remediation with respective asset owners
  • Advisory in prioritization of patch deployment
  • Assist the Client by providing SME assistance, and root-cause analysis on vulnerabilities
  • Manage vulnerability remediation through re-test & closure
  • Assist in reporting asset changes through Client’s technology, and processes
  • Learn and adapt to Client’s culture, security strategies, security goals, security objectives, and security capabilities
  • Maintain knowledge of outstanding vulnerability management issues as it pertains to the Client’s SCWX Vulnerability Management Service, and communicate updates to Client as appropriate
  • Conduct SCWX web portal training as-required
  • Act as local liaison for the SCWX VMS Dedicated Team and the Client as it relates to the delivery and support of the Client’s MSS Vulnerability Management Services
  • Collaborate with program management and Client teams to create both tactical and strategic plans as it relates to Vulnerability Management Services
  • Serve as an escalation point for all local Client technical issues requiring support within the Vulnerability Management offering
  • Provide technical authority, vision, documentation of operational procedures and guidance to ensure the continued evolution of Dell SecureWorks’ Managed Vulnerability offerings
  • Additionally, provide
22

Vulnerability Engineer Resume Examples & Samples

  • Effective in leading teams to accomplish program objectives
  • Understanding of systems engineering and requirements development are a plus
  • General background in propulsion systems design is a plus
  • NX or compatible CAD software experience
  • Familiarization with survivability/vulnerability assessment practices and analytical methods are a plus
23

Vulnerability Scanning & Remediation Senior Engineer Resume Examples & Samples

  • Responsible for understanding, reviewing, and interpreting Dell SecureWorks’ assessment and scanning results, reducing false positive findings, and acting as a trusted security advisor to the Client locally
  • Collaborate with program management and Client teams to create both tactical and strategic plans (establish and communicate a clear vision and ensure short term issues do not overtake strategic goals)
  • Serve as an escalation point for all local Client technical issues requiring support within the - Vulnerability Management offering
  • Providing Vulnerability Assessment Scanning and guidance, False Positive Validation, Attestation Signing, Compliance Scanning and policy creation using the QualysGuard Policy Compliance Suite and Web Application Scanning using the Qualys WAS Suite
  • 3+ years of experience in a technical security support role
  • Strong network engineering experience with Linux/Unix, - Windows, and network infrastructure administration
  • Experience with Vulnerability Management platforms such as QualysGuard, Nessus, Rapid 7
  • Experience with network and application security testing tools and scripting languages Nmap, Paros, Perl and Python
  • Provide guidance and support for Vulnerability remediation scenarios
  • Strong technical, analytical, and interpersonal skills; ability to interact with stakeholders like customer support or executive leadership teams, vendors, etc
  • Bachelor in Computer Science or another relevant technical field
  • One or more of the following certifications: CISSP, QSA GPEN, GWAPT, OSCP