Threat and Vulnerability Management Principal

United States Remote

Clario

Clario generates the richest clinical evidence by fusing our deep scientific expertise and global scale into the broadest endpoint technology platform.

View all jobs at Clario

Apply now Apply later

BASIC PURPOSE:
The Threat and Vulnerability Management (TVM) Principal is a high impact role within Clario’s Detect and Response pillar. In this role, the principal will be responsible for performing offensive security aspects of the cyber security program as well as discovering and driving the remediation of vulnerabilities within Clario’s infrastructure environment. The Principal will be responsible for hands-on execution of both Red and Purple Team exercises and will also stay abreast of new threat vectors. This role will transition identification of weaknesses into remediation and detective content to improve the security posture of the organization.

ESSENTIAL DUTIES AND RESPONSIBILITIES: 

  • Further develop and maintain the TVM program at Clario
  • Discover vulnerabilities in the environment and partner with teams across the organization to define remediation plans, drive and track remediation progress to completion, and find new approaches to improve the program.
  • Identify, validate, assess and document the severity and potential impact of vulnerabilities and give technical guidance to teams/owners in a way that consistently drives objective, fact-based decisions.
  • Engage closely with the Security Operations and Security Engineering teams to simulate adversarial TTPs and help develop detections, identify controls gaps, and recommend safeguards.
  • Perform manual penetration testing of infrastructure to identify, exploit vulnerabilities and/or confirm remediation.
  • Perform security assessments including internal, external, wireless, and social engineering.
  • Present findings and vulnerabilities to technical and non-technical stakeholders.
  • Develop technical and non-technical solutions to help mitigate security risks.
  • Maintain vulnerability management infrastructure to address overall enterprise scope including cloud, on-prem, and open-source software.
  • Utilize threat intelligence to learn about new vulnerabilities, assess the potential impact to Clario, and help define remediation priorities.
  • Execute processes to understand potential exposure to zero-day vulnerabilities when they are announced.

OTHER DUTIES AND RESPONSIBILITIES: 

  •  This role may be responsible for managing a team of no more than 3 comprised of employees, contingent workers and or members of a service provider.
  • Other job-related projects as assigned.

The duties and responsibilities listed in this job description represent the major responsibilities of the position.  Other duties and responsibilities may be assigned, as required. Clario reserves the right to amend or change this job description to meet the needs of Clario.  This job description and any attachments do not constitute or represent a contract.

QUALIFICATIONS AND SKILLS NEEDED: 

Education: 

  • Bachelors in Management of Information Systems or related field; an Associate’s Degree with equivalent knowledge, experience and relevant certifications will also be considered.
  • Security Certifications Preferred (e.g. CEH, Pentest+, LPT, CEPT, GPEN, GWAPT, CPT, OSCP)

             

Experience: 

  • 4-6 Years of Information Security experience, preferably within a Red Team or TVM team.
  • Experience leading a team and managing 3rd party vendors who provide independent vulnerability and penetration assessments.
  • Demonstrated ability to own and drive results.
  • Experience with operating vulnerability assessment tools, including network scanners, host-based detection agents, and cloud-based scanners to provide continuous monitoring and detection of vulnerabilities.
  • Experience with continuous analysis of vulnerability and security data to identify trends and weaknesses with patching effectiveness or vulnerability growth.
  • Strong understanding of security operations concepts such as adversary TTPs, perimeter defense, insider threat, kill-chain analysis, risk assessment and security metrics.
  • Prior experience with IT security testing (penetration testing, web app security assessments, and vulnerability assessments).
  • Server, application and network security hardening experience.
  • Strong analytical and critical thinking skills, including being detail oriented.
  • Strong troubleshooting, reasoning, and problem-solving skills
  • Team player with the ability to work autonomously.
  • Knowledge of Networking (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), Cloud Computing (AWS preferred), System Administration, and Security Architecture.
  • Program and Scripting experience is preferred.
  • Ability to interact with business and technical audiences across all levels of an organization.

The Department Head has the discretion to hire personnel with a combination of experience and education, which may vary from the above listed qualifications.

The Department Head has the discretion to hire personnel with a combination of experience and education, which may vary from the above listed qualifications.

EEO Statement
Clario is an equal opportunity employer.  Clario evaluates qualified applicants without regard to race, color, religion, gender, national origin, age, sexual orientation, gender identity or expression, protected veteran status, disability/handicap status, or any other legally protected characteristic.

Apply now Apply later
  • Share this job via
  • 𝕏
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  3  0  0
Category: Threat Intel Jobs

Tags: AWS CEH Cloud DNS Exploit GPEN GWAPT Monitoring Network security Offensive security OSCP Pentesting Red team Risk assessment Scripting Security assessment SMTP TCP/IP Threat intelligence TTPs Vulnerabilities Vulnerability management Zero-day

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.