Vulnerability Mgr profile- Austin - TX - 12 Months
Company: Intone Networks Inc.
Posted on: August 1, 2020
Vulnerability Manager Austin-TX 12 Months Phone and webex
Qualifying Experience and Attributes 10 Years experience in IT
Ability to configure and troubleshoot vulnerability scanning
systems and the networks on which they run. Direct experience
managing and troubleshooting one or more vulnerability scanning
products. Vendor certifications such as McAfee Product Specialist,
Symantec Certified Specialist are desirable. Other industry
certifications such as CISSP, GCIH, CEH, etc. are a plus.
Experience managing vulnerability scanning solutions both on
premise and in the cloud. Strong knowledge of Virtualized or Cloud
Computing. Working knowledge of Windows Active Directory Domains
Working Knowledge of various Linux OS Strong Knowledge of
information technology (IT) security principles and methods (e.g.,
firewalls, demilitarized zones, encryption). Ability to interpret
the information collected by network tools (e.g. Nslookup, Ping,
and Traceroute). Knowledge of computer networking concepts and
protocols, and network security methodologies. Knowledge of
cybersecurity and privacy principles. Knowledge of cyber threats
and vulnerabilities. Knowledge of application vulnerabilities.
Skill in conducting application vulnerability assessments. Skill in
performing impactrisk assessments. Knowledge of risk management
processes (e.g., methods for assessing and mitigating risk).
Knowledge of encryption algorithms, cryptography, and cryptographic
key management concepts. Knowledge of hostnetwork access control
mechanisms (e.g., access control list, capabilities lists).
Knowledge of vulnerability information dissemination sources (e.g.,
alerts, advisories, errata, and bulletins). Knowledge of incident
response and handling methodologies. Knowledge of network traffic
analysis methods. Knowledge of new and emerging information
technology (IT) and cybersecurity technologies. Knowledge of how
traffic flows across the network (e.g., Transmission Control
Protocol TCP and Internet Protocol IP, Open System Interconnection
Model OSI, Information Technology Infrastructure Library, current
version ITIL). Knowledge of key concepts in security management (e.
Knowledge of network systems management principles, models, methods
(e.g., end-to-end systems performance monitoring), and tools.
Signature implementation impact for viruses, malware, and attacks.
Knowledge of packet-level analysis using appropriate tools (e.g.,
Wireshark, tcpdump). Knowledge of network protocols such as TCPIP,
Dynamic Host Configuration, Domain Name System (DNS), and directory
services. Knowledge of how to use network analysis tools to
identify vulnerabilities. Skill in using protocol analyzers. Skill
in recognizing and categorizing types of vulnerabilities and
associated attacks. Skill in performing packet-level analysis.
Gurpreet Singh Technical Recruiter 1 732-313-2048 mailto
Keywords: Intone Networks Inc., Austin , Vulnerability Mgr profile- Austin - TX - 12 Months, Other , Austin, Texas
Didn't find what you're looking for? Search again!