Sr. Vulnerability / Automation Engineer
Discovery Communications
Sterling, VAThis was removed by the employer on 12/16/2020 11:31:00 AM PST
Not to worry we have many other jobs on the site;
Browse all jobs
Browse the IS/IT Category
Search for Sr. Vulnerability / Automation Engineer jobs in Sterling-VA
Search all Sr. Vulnerability / Automation Engineer postings
Full Time Job
Overview
The Sr. Vulnerability / Automation Engineer will have the responsibility of ensuring the overall infrastructure, operating system and application patching cycles are functioning appropriately and align with the Discovery security policies. As a part of the Info Sec team, candidates are expected to act as in-house consultants to help engineering and application support groups implement secure solutions and work with the Global IT team to remediate issues in accordance with all global policies, standards & mandates.
Responsibilities
• Provide guidance and solutions to engineering teams, IT support staff and application developers responsible for the patching and vulnerability remediation of systems and applications.
• Meet with technology owners weekly to ensure full visibility and understanding of open security vulnerabilities and the risks inherent with those vulnerabilities.
• Maintain and provide a detailed register of all open vulnerabilities, exceptions and remediation actions to ensure constant improvement of the Discovery risk surface
• Understand and communicate Discovery patching policies, standards, and procedures to business teams and ensure compliance.
• Collaborate with engineering teams and technology stakeholders to balance security remediation priority with potential business risk to ensure maximum security compliance with minimal operational impact to business systems.
• Develop and maintain relationships with engineering teams and business partners and provide an environment of trust and technical competence and set expectations of compliance with remediation SLAs
Requirements
• One or more of the following certifications required:
o GSEC, GCIH, SSCP, CCSP, CISSP-ISSEP, CEH, GCIA, GISF, Security Plus, Network Plus preferred but 3-5 years of experience and demonstrated knowledge accepted.
• BS degree in computer science or computer engineering preferred; will consider applicants with equivalent work-related experience with a minimum educational requirement of a high school diploma or GED equivalent.
• Ability to negotiate with business teams on timelines and expectations within the confines of set remediation SLAs.
• Working knowledge of at least one scripting language (Python, Go)
• Hands on technical experience with vulnerability management platforms (Rapid 7, Tenable, Qualys).
• Hands on technical experience with cloud native security compliance tools (AWS inspector, Google CSCC).
• 5-7 years technology operations experience, specifically operating systems such as Microsoft, Linux, Mac OS, Oracle, etc. as well as related sever applications.
• Hands on technical experience with cloud infrastructure and the vulnerabilities that may exist in bleeding edge cloud native infrastructure (VPC, ECS, RDS) and the remediation steps involved.
• Strong customer service, communication, and presentation skills required.
• Good understanding of data analysis and reporting with data analytics tools (Splunk, Kibana)
• Thorough understanding of risk, specifically the ability to derive residual and acceptable risk from competing priorities with regard to security and business impact.
• Must have the legal right to work in the United States