Home / Jobs

Lucid Technologies Inc

The Logical Solutions

Cyber Security Engineering IV
Job Title:  Cyber Security Engineering IV
Location:  Charlotte or Detroit (hybrid)
Number of Positions: 1 

due: 4/23/24 EOD. Onsite in Charlotte or Detroit for Hybrid model 3 days a week – may consider remote for ideal candidate. **Vulnerability Analyst **: **Vulnerability tool experience; **Systems Administration understanding and Advanced Excel experience; **Service Now experience; **Must have excellent communication skills – Proactive – independent, self-starter – independent worker who will take initiative and work well collaboratively. ** Video conference interview; provide location and best time to interview.

Description:   
The Vulnerability Analyst will support the configuration compliance and infrastructure vulnerability management programs with identifying, reporting, and enabling remediation of vulnerability and compliance findings. The ideal candidate for this role will have a strong technical foundation in system administration (Unix or Windows), familiarity with networking and cyber security, and hands-on experience with infrastructure scanning tools.  Cloud, container, and/or python development experience is a plus.  The candidate must be equally comfortable speaking with developers as well as infrastructure teams about vulnerabilities and configuration compliance.
 Reporting into the Director of Vulnerability Management, the Vulnerability Analyst will be accountable for the identification, reporting and remediation of vulnerability and compliance findings within their area of responsibility.

Principal Expectations
Maintain awareness of the latest critical information security vulnerabilities, threats, and exploits
Assist in facilitating vulnerability and compliance scanning and reporting activities, as directed by senior team members, ensuring accurate & timely identification, reporting, and escalation.
Leverage vulnerability management reports and metrics, to drive remediation of vulnerabilities for specified areas of the environment.
Communicate with Ally technology staff on vulnerability management and remediation of key vulnerabilities. Assist teams with understanding the vulnerability, possible remediations, and assist with false positives or mitigation solutions.  
Identify enhancements to tools, standards, and processes to enable continuous process improvement and automation of existing processes.
In zero-day events, iterate through VM lifecycle – creatively assist with time-sensitive escalations, developing new types of reports, and perform special investigations.

Required Skillsets:
Bachelor’s degree in a related field (Computer Science, Engineering, Information Systems, etc.) or the equivalent combination of training and experience
3+ years of experience in technology or cyber security
Mid-level knowledge of Windows or Linux system administration and related security configurations, networking, and cyber security
Intermediate Python development experience preferred.
Virtualization, cloud, and container experience preferred.
Working knowledge of security risk oversight, CVSS (Common Vulnerability Scoring System), CVE (Common Vulnerabilities and Exposures), and technical security vulnerability remediation/mitigation
Experience with enterprise vulnerability management platforms such as Rapid7 Nexpose, Tenable Nessus, or Qualys
Experience with ServiceNow preferred.
Skilled at analyzing IT/VM data sets using tools such as Excel or Power BI and presenting in a meaningful, digestible format for stakeholders and leadership teams.
Excellent communications skills (verbal and written) are required. Adept at communicating concepts to diverse audiences with varying skill sets.
A self-motivated, detail-orientated individual with the ability to work independently as well as function as an integral part of a team and take initiative and ownership in a fast-paced environment.

Mandatory Skills
Solid working experience and knowledge of Unix operating systems or Windows OS. Understanding of databases, web technologies, and network devices Experience with vulnerability scanners Strong verbal and written communications skills Intermediate competency with spreadsheets Intermediate competency writing scripts using python Able to write documentation Ability to identify and solve problems Able to organize meetings and translate discussed decisions into actions Self-directing with sense of ownership.

Desired Skills
Ability to design and document processes Ability to teach others their area or responsibility.

Skill Matrix: 
Microsoft Excel 
row toggle 4-5 Years Yes
Vulnerability scanners 
row toggle 4-5 Years Yes
Security Admin knowledge 
row toggle 4-5 Years Yes


Thanks & Regards, 
Preeti W 
US IT Recruiter 
Lucid Technologies Inc 
E: Preeti.w@lucidtechinc.com 
o: 214-385-4144 -211
W: www.LucidTechINC.com