Description

16+Hands-on experience with vulnerability management tools and technical understanding and experience assessing vulnerabilities and identifying weaknesses in multiple operating system platforms, servers, databases, and applications.
6+Experience with vulnerability management in a large global environment, while working with multidisciplinary teams.
* Producing visualizations of data to monitor for developing trends/patterns and highlighting areas of potential improvement. • Working with internal stakeholders to develop and implement effective vulnerability mitigation strategies.
* Evaluating cyber threats, vulnerabilities, and risks and effectively communicating them through written policies and procedures. • Researching and documenting security best practices for devices, applications, and emerging technologies.
* Ability to develop and update cybersecurity policy documents, system security plans, baselines, and threat models for deployment and risk acceptance decisions.
* Coordinate and ensure technical requirements of cyber security are appropriately documented and integrated into the overall site security efforts.
•Review and analyze planned projects and initiatives that may have an impact on the cyber security policies and procedures.
* Evaluate compliance with the organization's security policies and making recommendations for areas of improvement.
Written and verbal communication skills with the ability to collaborate through all parts of the business.
•Able to write in explanatory and procedural styles for multiple audiences and Skilled at prioritization and multi-tasking

Education

Any Graduate