*Immediate Need Qualys Security Engineer - Interview ASAP*
*Position : Qualys Security Engineer* *Location : Alpharetta, GA * *Duration : 6 month* *MUST HAVE: Qualys + Python Automation * • Must have the following modules: Vulnerability Management, WAS Application Scanning, Policy Compliance a plus (missed one of the modules) • Must have windows and Linux - must have. Linux emphasis • Caching - Need to be able to read a CVSS – more consultative vulnerability. • Need someone that can articulate what a vulnerability news brief in order to have the engineering teams patch it. • Must have Python scripting – to extract data out of Qualys (ltheir custom dashboards that display their metrics are written in Python) • Exposure to PCI compliance nice to have. Mitigation and reporting. • Archer RSA or GRC Suite exp nice to have ( they pipe the data into Archer RSA where the team manages that data and also the scan requests go through the RSA portal) Responsibilities: · Design, develop and implement QualysGuard Enterprise Vulnerability Management Platform throughout the organization · Design, develop and implement Python code to pull Vulnerability results from QualysGuard Enterprise, munge and parse the raw data and upload to a server for import into a cutting edge dashboard · Perform day to day operations for QualysGuard Enterprise Vulnerability Management solution · Design, develop and implement Rapid7 Metasploit Pro and Kali Linux penetration testing solution throughout the organization *Regards,* Aaron Smith - Staffing Manager Direct: *609-223-9188* |*aa...@itbtalent.com <aa...@itbtalent.com>* ITBrainiac Inc, Princeton, NJ 08540 www.itbrainiac.com -- You received this message because you are subscribed to the Google Groups "oraapps" group. To unsubscribe from this group and stop receiving emails from it, send an email to oraapps+unsubscr...@googlegroups.com. To post to this group, send email to oraapps@googlegroups.com. Visit this group at https://groups.google.com/group/oraapps. For more options, visit https://groups.google.com/d/optout.