Vulnerability Analyst I
Remote
Applications have closed
Marco Technologies LLC
Marco understands how organizations do business. It provides them with business technologies and managed services to take their business further.
Marco is a one-stop shop for all things business tech. Our employees are “movers and shakers” and our company is always striving to do what’s right. Does this sound like a culture you want to be a part of? We’re hiring a new team member to help take Marco’s technology further – working full-time, Monday - Friday, 8am-5pm. More about us. We do it all – from copy and print solutions to IT and managed services. We are an organization led by salespeople with 650+ engineers ready to fix any and all issues. We have offices in 12 states and service nationally. Join our growing team. You won’t regret it.
As a Vulnerability Analyst I, you will primarily support our clients by providing professional security services around vulnerability management and security awareness. You will work with clients to ensure vulnerability scans, security awareness campaigns, and phishing campaigns, cover all client resources, review the results, and make recommendations. This position will stay up to date with the latest security frameworks, controls, regulations, and practices. You will be a security escalation point for our internal resources and our clients.
This is a hybrid position working mostly remote but will be required to be in corporate office on occasion.
Successful candidates must reside within Minnesota, North Dakota, South Dakota, Nebraska or Iowa.
*all benefits are dependent on employment status To apply (and to learn more about what makes us great), visit: www.marconet.com/careers EEO/AA
As a Vulnerability Analyst I, you will primarily support our clients by providing professional security services around vulnerability management and security awareness. You will work with clients to ensure vulnerability scans, security awareness campaigns, and phishing campaigns, cover all client resources, review the results, and make recommendations. This position will stay up to date with the latest security frameworks, controls, regulations, and practices. You will be a security escalation point for our internal resources and our clients.
This is a hybrid position working mostly remote but will be required to be in corporate office on occasion.
Successful candidates must reside within Minnesota, North Dakota, South Dakota, Nebraska or Iowa.
ESSENTIAL FUNCTIONS:
- Schedule and conduct ongoing and ad-hoc vulnerability assessments within client environments.
- Review, recommend, and schedule phishing and training content for clients.
- Perform review and analysis of vulnerabilities, training compliance, and phishing campaigns.
- Assist clients with prioritizing vulnerability remediation.
- Assist clients with third-party vulnerability assessment remediation.
- Research and stay up to date with the latest vulnerabilities and attacks vectors.
- Understand Marco’s information systems, managed technology solutions, security architecture, and how it is designed to operate daily.
- Understand and maintain proficiency with NIST Cybersecurity Framework (CSF) including updates, organizational impacts, and practical use.
- Accurately maintain and comply with documentation, communication, time entry, and administrative procedures in a timely manner.
- Participate in on-call rotation and after hours work as required.
- Act in accordance with Marco policies and procedures as set forth in the employee handbook.
- Attend required company and departmental meetings.
- Perform other related duties as assigned.
EDUCATION AND EXPERIENCE:
- Associate's degree in computer science, cyber or information security or related field preferred
- 2+ years of experience with information security and technology
- OR equivalent combination of the above
- Proven experience with security concepts and technologies
LICENSES AND CERTIFICATIONS:
- Successful completion of an employment background check including criminal and financial history.
- Valid driver’s license, proof of personal insurance, and an acceptable driving record.
REQUIRED SKILLS:
- Basic understanding of vulnerability management and remediation processes and the tools that support these functions.
- Knowledge of vulnerability management within common security frameworks and controls including NIST CSF and CISC CSC.
- Understanding of common technology architectures.
- Knowledge of service management concepts for IT and/or security operations and related standards.
- Proficiency with business collaboration tools such as Office applications.
- Demonstrates attention to detail.
- Effective organizational and time/task management skills.
- Self-starter with the ability to perform with little or no direct supervision.
- Excellent communication skills in working with technical and non-technical people and the ability to develop and maintain collaborative relations among all levels of an organization.
- Treats people with respect; Works with integrity and ethically; Upholds organizational values.
- Follows policies and procedures; Completes administrative tasks correctly and on time; Supports organization's goals and values.
- Demonstrates accuracy and thoroughness; Looks for ways to improve and promote quality; Applies feedback to improve performance; Monitors own work to ensure quality.
*all benefits are dependent on employment status To apply (and to learn more about what makes us great), visit: www.marconet.com/careers EEO/AA
Tags: Compliance Computer Science Driver’s license NIST Vulnerabilities Vulnerability management Vulnerability scans
Perks/benefits: 401(k) matching Flex hours Flex vacation Health care Insurance
Region:
Remote/Anywhere
Job stats:
43
10
0
Category:
Analyst Jobs
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Security Operations Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Information Security Specialist jobs
- Open Cyber Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Senior Information Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open Cybersecurity Analyst jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Senior Security Architect jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open ISO 27001-related jobs
- Open Windows-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open Kubernetes-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open CI/CD-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open DevSecOps-related jobs