Security Analyst - Vulnerability, Scripting

Job Description: In need of a mid-level information security engineer to join our client's Risk and Vulnerability Management team.Required experience: At least 3 years of Information Security experience working as a red teamer or on an RVM team. Unix Administration Experience (we will consider Windows too). Experience with any types of vulnerability scanning tools. Qualys is big plus as you will be using this tool on a daily basis. Scripting in either one of these languages Python, Bash, Shell, Perl, Ruby, etc. Cloud Security Experience AWS, Azure, or proprietary cloud Strong understanding of OWASPs secure application development guidelines. Responsibilities: Support enhancements and new development of pen testing tools. Coordinate and execute vulnerability testing and reporting on internal and 3rd party systems Direct network penetration tests of Intranet and Internet networks. Responsible for ongoing remediation tracking and reporting to ensure that identified vulnerability are addressed. Execute mobile and web application testing. Plan, coordinate, and execute application architecture and engineering reviews to help ensure that new services are secure by design.Required Skills: Background in Incident Response (SOC/IR) plus!. Don't hesitate! Submit your resume today. SMCI is an EEO employer. All qualified applicants will receive consideration without regard to race, color, religion, sex, pregnancy, national origin, disability, age, genetic information, veteran status, sexual orientation and identity, AIDS/HIV, medical condition, political activities or affiliations, or status as a victim of domestic violence, assault, or stalking. (No third parties, please)(H1 sponsorship currently unavailable)(Local candidates only, please) - provided by Dice
Vulnerability, Scripting


Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Senior Security Analyst-Threat Vulnerability (...
Mountain View, CA ASRC Federal
Senior Security Analyst-Threat Vulnerability (...
Mountain View, CA ASRC Federal
Sr Information Security Analyst - Software Sec...
Milpitas, CA Kohl's
IT Security Analyst 4
Sacramento, CA Oracle
IT Security Analyst 4
Santa Clara, CA Oracle