Senior Cyber Security Engineer, Vulnerability Management
FRANKLIN, Tennessee, United States
Community Health Systems
CHS has been developing and operating healthcare delivery systems committed to helping people get well and live healthier for nearly 40 years.Community Health Systems is one of the nation’s leading healthcare providers. Developing and operating healthcare delivery systems in 39 distinct markets across 15 states, CHS is committed to helping people get well and live healthier. CHS operates 70 acute-care hospitals and more than 1,000 other sites of care, including physician practices, urgent care centers, freestanding emergency departments, occupational medicine clinics, imaging centers, cancer centers and ambulatory surgery centers.
Summary:
As a member of the Information Security team, the Cyber Security Senior Engineer for Vulnerability Management will be responsible for developing, implementing, and operating vulnerability management solutions to identify, classify, and report existing and emerging vulnerabilities detected in enterprise infrastructure. The Senior Engineer will operate within the existing threat management team as an expert in vulnerability management, ensuring sound practices while designing, growing, and maintaining the vulnerability management program, contributing to vulnerability identification and remediation methodologies, supporting penetration testing practices, report generation, and more. The Senior Engineer will be responsible for seeking out and reporting on vulnerability discoveries and classifications of new vulnerabilities. The Senior Engineer will work directly with other security and information technology team members to develop plans for reporting and remediation of vulnerabilities across all operating systems and applications in the enterprise.
Essential Duties and Responsibilities:
- Develop, implement, and operate vulnerability management solutions to identify, classify, and report existing and emerging vulnerabilities in enterprise infrastructure including application and multi-cloud technologies.
- Serve as the subject matter expert in vulnerability management within the threat management team, contributing to the development, engineering, and maintenance of the vulnerability management program.
- Apply industry best practices and standards to vulnerability identification and remediation methodologies, penetration testing practices, and report generation.
- Stay up to date on the latest vulnerability discoveries and classifications, and proactively assess and report their potential impact on the organization's systems and applications.
- Collaborate with security and IT team members to develop comprehensive plans for reporting and remediation of vulnerabilities across all operating systems, cloud computing systems, and applications in the enterprise.
- Conduct regular vulnerability assessments, utilizing automated tools and manual techniques to ensure thorough coverage and accuracy.
- Analyze vulnerability assessment results and provide recommendations for prioritizing and remediating vulnerabilities based on risk and impact.
- Work closely with IT partners to coordinate and track the progress of vulnerability remediation efforts, ensuring timely resolution of identified vulnerabilities.
- Contribute to the development and maintenance of vulnerability management policies, procedures, and documentation.
- Provide guidance and support to junior team members, fostering knowledge sharing and professional growth within the vulnerability management team.
- Business and Soft Skill expectations:
- Communicate and interact effectively and professionally with co-workers, management, customers, etc.
- Maintain complete confidentiality of company business.
- Communicate with management regarding development within areas of assigned responsibilities and perform special projects as required or requested.
Qualifications:
- Required Education: High School diploma
- Preferred Education: Bachelor’s or Master’s Degree in Cyber Security, Computer Science, Information Systems (or other related field), or equivalent work experience.
- Required Experience:
- Duration:
- 3+ years of IT or information security, and
- 2+ years of vulnerability management
- Activities:
- Practical experience with designing and implementing technologies related to vulnerability management including vulnerability scanning, penetration testing, and configuration management
- Served as expert thought leader for vulnerability management technologies and influenced the strategy for remediation
- Worked in process-driven structured environments and participated in process optimization activities.
- Competencies:
- In-depth knowledge of vulnerability management tools, techniques, and best practices.
- Familiarity with industry frameworks and standards such as NIST, CIS, and CVSS.
- Strong understanding of operating systems, network protocols, and web applications.
- Experience with vulnerability scanning and assessment tools (e.g., Nessus, Qualys, OpenVAS).
- Excellent analytical and problem-solving skills, with the ability to prioritize and address vulnerabilities based on risk.
- Strong communication and collaboration skills to work effectively with cross-functional teams.
- Relevant certifications such as CISSP, CISA, or GIAC certifications are a plus.
- Commitment to continuous learning and staying updated on the latest trends and threats in the field of vulnerability management.
- Strong understanding of lifecycle management principles and their application to the remediation of cybersecurity vulnerabilities
- Effective communication of technical concepts to a non-technical audience
- Excellent written and verbal communication skills
- Duration:
- Preferred Experience: 3+ years of vulnerability management
- Required License/Registration/Certification: None
- Preferred License/Registration/Certification:
- SANS Certifications
- GIAC Certifications
- EC Council CEH
- Computer Skills Required:
- Productivity suite software required
- Python, Powershell, Microsoft SQL, industry standard vulnerability scanning software, and various other cybersecurity tools preferred
Physical Demands:
In order to successfully perform this job, with or without a reasonable accommodation, the following are outlined below:
- The Employee is required to read, review, prepare and analyze written data and figures, using a PC or similar, and should possess visual acuity.
- The Employee may be required to occasionally climb, push, stand, walk, reach, grasp, kneel, stoop, and/or perform repetitive motions.
- The Employee is not substantially exposed to adverse environmental conditions and; therefore, job functions are typically performed under conditions such as those found within general office or administrative work.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CEH CISA CISSP Cloud Computer Science CVSS GIAC Nessus NIST OpenVAS Pentesting PowerShell Python Qualys SANS SQL Strategy Vulnerabilities Vulnerability management
Perks/benefits: Career development Startup environment
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.