CSW discovers a new zero day in ZOHO CRM Lead Magnet!

VMaaS Engineer

VMaaS Engineer

The Role

The Information Security Engineer II on the Cybersecurity Vulnerability Assessment Services (CVAS) team within Enterprise Security is primarily responsible for identifying, establishing, enhancing, and performing operational functions of vulnerability management. Operational functions include establishing and maintaining scanning capabilities, identifying vulnerabilities through scanning capabilities, and providing remediation oversight of vulnerabilities on CSW Client’s servers, databases, applications, network elements, and other systems. The engineer is responsible to assist with realizing strategic security initiatives to improve the team capabilities associated with vulnerability management and vulnerability scanning methodology. 

The engineer must possess general knowledge of cybersecurity threats, vulnerabilities, and technologies. The engineer must possess broad knowledge of Information Security and Information Technology (IT) systems as well as a reasonable understanding of all disciplines of networking, programming, application development, and system administration. The engineer must have effective oral and written communication skills to provide remediation oversight of vulnerabilities, document team procedures and processes, and assist with documents intended for executive review and approvals. The engineer must be able to work independently, as well as collaboratively with others, to foster consulting relationships with internal partners.

The Main Responsibilities

  • Perform operational support of vulnerability management systems and applications that the CVAS team is responsible to maintain and define documented procedures and processes.
  • Coordinate and lead routine vulnerability scanning and remediation oversight on CSW client’s systems as required for compliance of Payment Card Industry Data Security Standard (PCI DSS), Cybersecurity Maturity Model Certification (CMMC), and other industry compliance standards as necessary.
  • Contribute to realize strategic security initiatives to improve vulnerability management and vulnerability scanning capabilities through automation development, processes enhancements, and infrastructure expansion.
  • Identify deficiencies within vulnerability management and vulnerability scanning tools, procedures, and processes and provide recommendations for improvement and automation.
  • Create reports and generate vulnerability metrics for executive management levels to utilize in making informed business decisions that impact the security of CSW

Client’s and its customers.

  • Identify vulnerabilities on CSW Client’s systems through vulnerability scanning for CSW Client’s infrastructures, products, and services encompassing network elements, operating systems, databases, and applications across the corporate enterprise.
  •  Perform active cyber defence activity – threat hunting by proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions and zero day vulnerabilities specific to the CSW client’s infrastructure.
  • Contribute to develop, facilitate, and maintain the Information Security Policy, Methods & Procedures, Technical Standards, Technical Best Practices, and general processes for vulnerability management.
  • Represent Corporate Security as a Subject Matter Expert (SME) regarding CSW Client’s vulnerability scanning capabilities and methodologies.
  • Oversee the response to High severity vulnerabilities that impact CSW Client’s systems by analyzing the vulnerabilities, identifying systems impacted, and collaborating with system owners to communicate the risk of vulnerabilities, establish remediation priority, and validate remediation efforts.
  • Instill a security culture company-wide through vulnerability awareness and remediation mindset.

What We Look For in a Candidate

  • Undergraduate degree in Information Security, Computer Science, Computer Engineering, or related field, or equivalent experience.
  • 2+ years experience in Information Security 
  • Experience utilizing multiple vulnerability scanning tools and platforms.
  • Knowledge of current and emerging cybersecurity threats, vulnerabilities, and technologies.
  • Awareness of NIST Vulnerability Database pertaining to vulnerability severity ratings.
  • General understanding of common networking protocols.
  • General understanding and experience of UNIX derivative operating system distributions as well as various Windows operating systems.
  • Effective oral and written communication skills and comfort with presenting technical issues to all levels of management, as well as non-technical staff.
  • General understating on API integration concepts.

Preferred Qualifications:

  • Applied experience performing vulnerability scanning and vulnerability management functions for medium to large enterprises encompassing network elements/protocols, operating systems, databases, and applications including systems in scope for a compliance standard.
  • Applied experience with OWASP Top 10, SANS Top 20, and NIST Vulnerability, Database.
  • Strong problem-solving skills to adapt to client environment and provide support.
  • Basic knowledge of programming languages such as Python, C#, GoLand or UNIX, Shell, API programming.
  • Strong understanding of network architecture and switching/routing implementation as it relates to scanner placement.
  • Awareness of information security industry and regulatory obligations (PCI, FISMA, HIPAA, ISO 27001/27002, NIST Framework, CMMC) pertaining to vulnerability management.