*Hi*

*Please go through the below position and if you feel comfortable, then
please send me your updated resume*



*Position        : Sr. Vulnerability Engineer*

*Location       : Minneapolis, MN*

*Duration      : 6+ Months*

*Interview     : Phone and Skype*



*This is a backfill for our Sr. Engineer* who has been repurposed to the
CIH project Is this person a sole contributor or part of a team? Part of a
team If so, please describe the team? (Name of team, size of team, etc.)

*Vulnerability Mgmt - 11 onsite, 9 offshore What are the top 5-10
responsibilities for this position? (Please be detailed as to what the
candidate is expected to do or complete on a daily basis)*

·         Define, implement, and support the vulnerability management
capabilities for United Health Group, its affiliates, and customers which
include the following:

·         Vulnerability Scanning - configuring vulnerability assessment
tools, performing scans, researching and analyzing vulnerabilities,
identifying relevant threats, summarizing and reporting results.

·         Configuration Compliance Scanning - configuring compliance
scanning tools, creating baseline tests, summarizing and reporting results.

·         Stakeholder Consulting

·         Provide vulnerability management consulting services, as needed,
to various projects.

·         Build effective relationships with stakeholders who own and
support security audit and compliance, security architecture and
operations, and IT infrastructure.

·         Gain commitment from stakeholders and project teams to implement
recommended security controls.

·         Platform management:

·         Perform life Cycle Management activities including proof of
concept evaluations, product selection, coordination of technical refresh
activities, inventory management, and decommission

*What software tools/skills are needed to perform these daily
responsibilities?*

·         BS in Computer Science or equivalent.

·         3-5 years demonstrated expertise defining, implementing, and
delivering threat and vulnerability management scanning tools (e.g.
Tripwire, Rapid 7, Nessus, etc.)

·         3-5 years demonstrated expertise defining, implementing, and
delivering configuration compliance scanning tools (e.g. Tripwire, Rapid 7,
Nessus, etc.)

·         Must be well versed in networking, operating systems (e.g. Linux,
Windows, etc.), active directory, authorization and authentication, and
databases.

·         Technical network (e.g. CCNA, CCNP Security) and security
certifications highly desirable (e.g. CISA, CISSP, GCIH).

·         Understanding of controls (e.g. access control, auditing,
authentication, encryption, and application security).

·         Ability to provide quality deliverables on time and on budget.

·         Ability to initiate, design, execute, and complete projects
independently with minimal direction.

·         Must possess excellent communication skills (written, verbal) and
be able to work effectively with technical and non-technical individuals
alike.

·         Ability to mentor other employees to improve their skills and
effectiveness.

·         Ability to solve problems independently

·         United States Citizenship

   - Ability to obtain favorable adjudication following submission of
   Department of Defense form SF86 NAC form SF86 (see below for details)







[image: logo]

*Ankush Nirala* | Technical Recruiter | Apetan Consulting LLC

Tel: 201- 620- 9700* 112 | Mail: 72 Van Reipen Avenue # 255 Jersey City, NJ
07306 |

Corp.Office: 15 Union Avenue,  office # 6,  Rutherford, New Jersey 07070 |

ank...@apetan.com | G-talk: ankush...@gmail.com | www.apetan.com

*[image: https://s3.amazonaws.com/images.wisestamp.com/icons/facebook.png]*
<http://www.facebook.com/Apetanconsulting> *[image:
https://s3.amazonaws.com/images.wisestamp.com/icons/linkedin.png]*
<http://www.linkedin.com/company/apetan-consulting-llc?trk=top_nav_home>
*[image:
https://s3.amazonaws.com/images.wisestamp.com/icons/twitter.png]*
<http://twitter.com/ApetanLLC> [image: e verify]

*Disclaimer*: We respect your Online Privacy. This e-mail message,
including any attachments, is for the sole use of the intended recipient(s)
and may contain confidential and privileged information. Any unauthorized
review, use, disclosure or distribution is prohibited. If you are not the
intended recipient, please contact the sender by reply e-mail and destroy
all copies of the original message. If you are not interested in receiving
our e-mails then please reply with a "REMOVE" in the subject line at
rem...@apetan.com and mention all the e-mail addresses to be removed with
any e-mail addresses, which might be diverting the e mails to you. We are
sorry for the inconvenience.

Reply via email to