JOB SUMMARY
A vulnerability management analyst is an advanced, hands-on practitioner and representative of the cybersecurity defense team. The role is technical, and candidates must possess a solid understanding of information security and preferably have held positions in cybersecurity and systems administration. The role also requires an understanding of business and governance process. Vulnerability management analysts are responsible for the overall management lifecycle of the program. They must understand applications, operating systems, networking, cloud infrastructure and basic attacker tactics, techniques and procedures (TTPs). Additionally, analysts are expected to maintain a high level of rigor to stay up-to-date with advancements in technology, while also retaining knowledge of older systems and applications in use.
Vulnerability management analysts understand that legacy and present-day systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given that vulnerability management and risk exposure extend across all technical systems enterprise-wide, responsibilities of this position include identifying assets and vulnerabilities, reporting, remediation and continuous assessment. The position must collaborate with others on the team for remediation and additional validation, as well as contribute to other collaborative approaches driven by the security team strategy.
Vulnerability management analysts are expected to assist with strategic initiatives for short- as well as long-term plans to identify and reduce the attack surface across applications and systems. Use of automated tools to identify, assess and report is expected, with emphasis placed on effective communication to constituents relying on applications and systems that support their business. Vulnerability management analysts take an active lead to inform, advise and partner with business units to help better secure their operations.
ESSENTIAL DUTIES
The duties listed below may not include all responsibilities that the person in this role may be asked to perform. Incumbent may be required to perform other related duties, as assigned, including cross training across other departments, as necessary.
- Work as a team to consistently learn and share advanced skills and foster team excellence.
- Manage vulnerabilities across applications, endpoints, databases, networking devices, and mobile, cloud and third-party assets.
- Conduct continuous discovery and vulnerability assessment of enterprise-wide assets.
- Document, prioritize and formally report asset and vulnerability state, along with remediation recommendations and validation.
- Communicate vulnerability results in a manner understood by technical and non-technical business units based on risk tolerance and threat to the business, and gain support through influential messaging.
- Procure and maintain tools and scripts used in asset discovery and vulnerability status.
- Leverage vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds.
- Support internal and external auditors in their duties that focus on compliance and risk reduction.
- Collaborate with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface.
- Work closely with infrastructure teams to advise and support remediation efforts to close vulnerability exposure to new threats in the wild and verify the organization’s security posture against them.
- Regularly research and learn new TTPs in public and closed forums, and work with colleagues to assess risk and implement/validate controls as necessary.
- Maintain an active database comprising third-party assets, their vulnerability state, remediation recommendations, overall security posture and potential threat to the business.
- Arrange and provide support to business units launching new technology applications and services to verify that new products/offerings are not at risk of misconfiguration, compromise or information leakage.
- Periodically attend and participate in change management policy discussions and meetings.
- Define key performance indicators (KPIs) and metrics across business units to illustrate effectiveness with vulnerability management.
- Understand breach and attack simulation solutions for known vulnerabilities and work with the team to validate controls effectiveness.
- Liaise with the security engineering team to improve tool usage and workflow, as well as with the advanced threats and assessment team to mature monitoring and response capabilities.
- Perform other duties as assigned.
Skills and Experience
At least 5-7+ years’ experience in information security administration, vulnerability management or security operations.
Proficient with vulnerability management solutions such as Qualys, Nexpose, Nessus, Kenna Security, Tanium and open source.
Experience stabilizing systems to run minimal application requirements, least privilege and additional host hardening.
Understanding of Windows and *nix operating systems, endpoint applications, networking protocols and devices.
Preferably some experience with vulnerability management across Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform (GCP).
Experience conducting organization-wide vulnerability scanning and remediation processes.
Ability to obtain and maintain technical team and business support to influence a collaborative effort to reduce attack surface.
Knowledge of one or more compliance standards, including Payment Card Industry (PCI), Health Information Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act (GLBA), National Institute of Standards (NIST) or International Standards Organization (ISO).
Capable of scripting in Python, Bash, Perl or PowerShell.
Understanding of OWASP, CVSS, the MITRE ATT&CK framework and the software development lifecycle.
QUALIFICATIONS
These specifications are general guidelines based on the minimum experience normally considered essential to the satisfactory performance of this position. The requirements listed below are representative of the knowledge, skill and/or ability required to perform the position in a satisfactory manner. Individual abilities may result in some deviation from these guidelines.
- Bachelor’s of Science degree in computer science, information assurance or other related field, or equivalent work experience
- 3 to 5 years IT security, information security, or related IT experience preferred
- Proven trustworthiness and history of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating well.
- Self-starter requiring minimal supervision.
- Excellence in communicating business risk and remediation requirements from assessments.
- Analytical and problem-solving mindset.
- Highly organized and efficient.
- Demonstrated strategic and tactical thinking, along with decision-making skills and business acumen.
- Preferably, one or more of the following: GCED, GCCC, GPEN, GCIH, CISSP or CRISC.
ORGANIZATION
This position reports to the Information Security Officer.
This position does not oversee other positions.
TRAINING REQUIREMENTS
All employees are required to attend scheduled mandatory trainings and complete online regulatory compliance training courses applicable to their specific job function. In all situations, employees must ensure that their actions fully comply with all federal banking laws and regulations, including internal bank policies and procedures. Failure to adhere to these requirements will be grounds for disciplinary action, including probation and possible termination.
COMMUNITY INVOLVEMENT
Lone Star National Bank’s Mission Statement includes a commitment to helping our communities grow by serving them with pride and integrity. All employees are encouraged to volunteer for bank sponsored activities, civic, charitable and community events and to be active in the communities we serve.
LSNB is an Equal Opportunity/Affirmative Action Employer and does not discriminate in the recruitment, hiring, and conditions of employment on the basis of race, color, religion, national origin, sex (including pregnancy), sexual orientation, gender identity, marital status, disability, age, veteran status, or any other status as protected by applicable laws.
Management reserves the right to change this position description at any time according to business needs.