Contract Assignment

3+ months (could go longer)



Responsibilities:

Evaluate all new security vulnerabilities identified by vendors of
technologies used within the Enterprise

Investigate solutions and mitigations for vulnerabilities present within
the Enterprise, and propose remediation.

Support execution of vulnerability management programs through meeting
facilitation, activity measurement, customer engagement, and program
education

Perform barrier analysis on vulnerability remediation; identify and
implement corrective measures

Develop reports that reflect vulnerability management program effectiveness
and efficiency and perform targeted historical analysis; review historical
trending data; recommend improvement opportunities

Work with Security Architecture and technology stakeholders to inform the
development of Minimum Baseline Standards for secure configuration

Vulnerability Assessment and Treatment Analysis: Evaluate infrastructure
and application security vulnerabilities and communicate risk-based
treatment expectations



Vulnerability Management Program Support: Meeting facilitation, activity
measurement, customer engagement, and program education

Reporting: Vulnerability management program effectiveness and efficiency
and perform targeted historical analysis

Remediation Barrier Analysis: Analyze remediation failures and work with
Information Security and Operations teams to identify and implement
corrective measures

Minimum Security Baseline Configuration: Work with Security Architecture
and technology stakeholders to inform the development of Minimum Baseline
Standards for secure configuration



The ideal candidate will have a background in information security
disciplines and vulnerability management; previous operational systems
administration experience is strongly preferred.

He or she will have broad knowledge of infrastructure, operating system,
and application technologies.

He or she should be familiar with writing and publishing information
security advisories.

Security Knowledge, Direct experience with security analyst - analyzing
vulnerability, not scanning for them, but break it down apply a risk model
to it.







-- 
*Thanks & Regards*
*Raman M*
*REASONSOURCETECH.*

-- 
You received this message because you are subscribed to the Google Groups 
"Oracle Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/oracle-users.
For more options, visit https://groups.google.com/d/optout.

Reply via email to