Job Seekers, Please send resumes to resumes@hireitpeople.comJob Description:
Vulnerability Management Program Manager (VMPM) responsible for implementation of a City Wide Vulnerability Management Program that will ensure IT System Vulnerabilities are found (through the use of Vulnerability Management Software) and remediated.
Major Duties:
Responsibilities/Duties:
- Analyze current vulnerability management tools for network scanning and static code analysis and determine how to best leverage tools to support the Vulnerability Management Program.
- Participate in the CCB and represent the Go/NO-GO position for the CISO based on Vulnerability Management remediation.
- Perform static code analysis using supplied tools on an 'as-required' basis.
- Perform network scanning using supplied tools on an 'as-required' and scheduled basis.
- Provide weekly reports for inclusion in the District Cyber Security Report.
- Coordinate and perform quarterly cooperative Agency Vulnerability Management and report results as appropriate.
- Analyzes and defines security requirements for Multi-level Security issues. Designs, develops, engineers, and implements solutions to Multi-level Security.
Responsibilities:
- Determines enterprise information assurance and security standards.
- Develops and implements information assurance/security standards and
- procedures.
- Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customers' requirements.
- Identifies, reports, and resolves security violations.
- Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.
- Supports customers at the highest levels in the development and implementation of doctrine and policies.
- Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.
- Performs analysis, design, and development of security features for system architectures.
- Analyzes and defines security requirements for computer systems, which may include mainframes, workstations, and personal computers.
- Designs, develops, engineers, and implements solutions that meet security requirements.
- Provides integration and implementation of the computer system security solution.
- Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.
- Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
- Ensures that all information systems are functional and secure.
- Bachelor's degree in Information Technology or related field or equivalent experience.
- 11-15 yrs developing, maintaining, and recommending enhancements to IS policies/requirements.
- 11-15 yrs performing vulnerability/risk analyses of computer systems/apps.
- 11-15 yrs identifying, reporting, and resolving security violations.
- Bachelor's degree in IT or related field or equivalent experience.
SKILL |
YEARS USED |
LAST USED |
Overall
IT Exp. (11-15 |
|
|
Education: |
|
|
Certifications: |
|
|
11-15 yrs. developing, maintaining, and recommending enhancements to IS policies/requirements. Not Required. 11 Years. |
|
|
11-15 yrs. performing vulnerability/risk analyses of computer systems/apps. Not Required. 11 Years. |
|
|
11-15 yrs. identifying, reporting, and resolving security violations. Not Required. 11 Years. |
|
|
11-15 years of technical experience in the IT System Management. Required. 11 Years. |
|
|
3-5 years demonstrated operational implementation and use of Rapid7, Nessus, or similar Network Scanning tools. Required. 3 Years. |
|
|
3-5 years demonstrated operational implementation and use of Fortify and ParaSoft static code analysis tools. Required. 3 Years. |
|
|
Demonstrated proficiency with Microsoft Vulnerability Management (WSUS, BF, SCCM,) including distributed branch caching. Required. 3 years. |
|
|
Demonstrated proficiency with HEAT and SATELLITE patch management tools for Windows and Unix environment patching. Required. 5 Years. |
|
|
Demonstrated understanding of DEVOPS and SECDEVOPS as it applies to and support lifecycle development and secure coding techniques. Required. 3 Years. |
|
|
B.A. or B.S. degree in Computer Science, Information systems or 6 years of equivalent experience in a related field. Highly desired. |
|
|
Industry Specific (Security+, CEH, CISSP) or tool specific certification (Rapid7, Nessus, Parasoft, Fortify, WSUS, BF, SCCM, Heat, Sattelite) desired. Highly desired. |
|
|