Sr. Cloud Infrastructure Vulnerability Analyst

Dallas

Blue Yonder

Blue Yonder provides 3,000 of the world’s leading brands with supply chain planning solutions that leverage full power of their data to take action at scale.

View all jobs at Blue Yonder

Apply now Apply later

Role : Cloud Security Analyst

Location: Dallas, TX - Hybrid role

Synonyms- Cloud Infrastructure vulnerability Analyst

Overview: 

  • Blue Yonder is a Leading AI-driven Global Supply Chain Solutions Software Product Company and one of Glassdoor’s “Best Places to Work”  
  • Seeking an Sr. Cloud Infrastructure Vulnerability Analyst who would be responsible for Cloud Security Posture Management (CSPM), identifying security vulnerabilities including misconfigurations across cloud infrastructures, including Infrastructure as a Service (IaaS), Software as a Service (Saas), and Platform as a Service (PaaS).  
  • This candidate would also be responsible for Cloud Workload Protection (CWP), to provide continuous discovery and monitoring of vulnerabilities in the workloads deployed in the cloud infrastructure.
  • Candidate will be directly responsible for vulnerability management and threat management of the overall infrastructure and information assets.

Scope: 

  • Core responsibilities to include assessing and promoting remediation for all the assets in the Infrastructure as a Service (IaaS) and Software as a Service (Saas).
  • Candidate will be a key member of the centralized information security team.

What you’ll do: 

  • Discover and continuously monitor for vulnerabilities in the public cloud infrastructure, cloud workloads including dockers, Kubernetes, and containers, etc.
  • Create golden images for virtual machines, dockers and containers to be spun up for the business.
  • Identify gaps in Identity and Management (IAM) in Public Cloud.
  • Perform vulnerability scans and report findings for On-prem and Cloud networks.
  • Publish the vulnerability status reports to senior management and track remediation.
  • Define and participate in implementation of On-prem and Cloud architecture and security controls.
  • Proactive identification of threats and risk remediation.
  • Discover the assets in the cloud infrastructure to identify and continuously monitoring for security vulnerabilities and misconfigurations.
  • Maintain security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs.
  • Upgrade security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements.
  • Participate in and assist with incident response team, as appropriate.
  • Generate metrics for the Management as needed.
  • Prepare system security reports by collecting, analyzing, and summarizing data and trends.

What we are looking for:  

  • 6-8 years of proven experience in Information security or Vulnerability Management and atleast 4 years of experience in Cloud security; a Master’s degree can be substituted for experience. 
  • Extensive experience in public cloud infrastructure such as Microsoft Azure, Google GCP, or AWS.
  • Proven experience in Cloud Security Posture Management tools like Microsoft Defender, Wiz, Tenable, Aqua Security, Prisma Cloud, Lacework, Scribe Security, etc.
  • Certifications such as CCSK, CCSP, GCSA, Microsoft Certified Azure Security Engineer Associate, CISSP or equivalent. 
  • Strong expertise in Vulnerability and Threat Management, gathering and condensing threat intelligence into actionable and meaningful communication materials. 
  • Thorough understanding of Identity and Access Management best practices in Public cloud.
  • Bachelor’s degree in information security or Information Technology or Computer Science or related fields or from STEM
  • Deep and diverse experience architecting and implementing network security designs. Expert in network security, system security and endpoint security. 
  • Through understanding of security vulnerabilities and misconfigurations in the cloud infrastructure.
  • Thorough understanding of native cloud solutions like dockers, containers, Kubernetes, VDIs, cloud storage, cloud infrastructure, etc.
  • Familiarity with security frameworks and regulatory requirements such as NIST, ISO 27001/2, and SSAE-18. 
  • Proven experience with products dealing with vulnerability management services which include Qualys, Nessus, Nexpose, etc. 
  • Practical experience with the development, implementation, and management of security related technologies (i.e., SIEM, WAF, AV, Firewalls, Internet-facing services). 
  • Excellent customer service including strong written and oral communication skills. 
  • Knowledge of security network devices (firewalls, switches, SIEM, Antivirus, cryptography, etc.) and other security networking hardware/software tools. 
  • Demonstrated understanding of information security concepts, standards, practices, including but not limited to firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management and event monitoring/reporting. 
  • Results focused and attention to detail. 
  • Ability to work in the 2nd shift to provide global coverage.

#LI-SR1

-------------------------------------------

The Salary Range for this position is $105,261.54 to $132,738.45

The salary range information provided, reflects the anticipated base salary range for this position based on current national data.  Minimums and maximums may vary based on location.  Individual salary will be commensurate with skills, experience, certifications or licenses and other relevant factors.  In addition, this role will be eligible to participate in either the annual performance bonus or commission program, determined by the nature of the position.

At Blue Yonder, we care about the wellbeing of our employees and those most important to them. This is reflected in our robust benefits package and options that includes: 

  • Comprehensive Medical, Dental and Vision 

  • 401K with Matching 

  • Flexible Time Off 

  • Corporate Fitness Program 

  • Wellbeing Days 

  • A variety of voluntary benefits such as; Legal Plans, Accident and Hospital Indemnity, Pet Insurance and much more

At Blue Yonder, we are committed to a workplace that genuinely fosters inclusion and belonging in which everyone can share their unique voices and talents in a safe space. We continue to be guided by our core values and are proud of our diverse culture as an equal opportunity employer. We understand that your career search may look different than others, and embrace the professional, personal, educational, and volunteer opportunities through which people gain experience.

Our Values


If you want to know the heart of a company, take a look at their values. Ours unite us. They are what drive our success – and the success of our customers. Does your heart beat like ours? Find out here: Core Values

Diversity, Inclusion, Value & Equality (DIVE) is our strategy for fostering an inclusive environment we can be proud of. Check out Blue Yonder's inaugural Diversity Report which outlines our commitment to change, and our video celebrating the differences in all of us in the words of some of our associates from around the world.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

Apply now Apply later
  • Share this job via
  • 𝕏
  • or
Job stats:  3  1  0

Tags: Antivirus AWS Azure CCSK CCSP CISSP Cloud Compliance Computer Science Cryptography CSPM Endpoint security Firewalls GCP IaaS IAM Incident response Intrusion prevention ISO 27001 Kubernetes Monitoring Nessus Network security NIST PaaS Qualys SaaS SIEM STEM Strategy TCP/IP Threat intelligence Vulnerabilities Vulnerability management Vulnerability scans

Perks/benefits: Career development Equity / stock options Flex vacation Health care Insurance Salary bonus

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.