Contract Assignment 3+ months (could go longer)
Responsibilities: Evaluate all new security vulnerabilities identified by vendors of technologies used within the Enterprise Investigate solutions and mitigations for vulnerabilities present within the Enterprise, and propose remediation. Support execution of vulnerability management programs through meeting facilitation, activity measurement, customer engagement, and program education Perform barrier analysis on vulnerability remediation; identify and implement corrective measures Develop reports that reflect vulnerability management program effectiveness and efficiency and perform targeted historical analysis; review historical trending data; recommend improvement opportunities Work with Security Architecture and technology stakeholders to inform the development of Minimum Baseline Standards for secure configuration Vulnerability Assessment and Treatment Analysis: Evaluate infrastructure and application security vulnerabilities and communicate risk-based treatment expectations Vulnerability Management Program Support: Meeting facilitation, activity measurement, customer engagement, and program education Reporting: Vulnerability management program effectiveness and efficiency and perform targeted historical analysis Remediation Barrier Analysis: Analyze remediation failures and work with Information Security and Operations teams to identify and implement corrective measures Minimum Security Baseline Configuration: Work with Security Architecture and technology stakeholders to inform the development of Minimum Baseline Standards for secure configuration The ideal candidate will have a background in information security disciplines and vulnerability management; previous operational systems administration experience is strongly preferred. He or she will have broad knowledge of infrastructure, operating system, and application technologies. He or she should be familiar with writing and publishing information security advisories. Security Knowledge, Direct experience with security analyst - analyzing vulnerability, not scanning for them, but break it down apply a risk model to it. -- *Thanks & Regards* *Raman M* *REASONSOURCETECH.* -- You received this message because you are subscribed to the Google Groups "Oracle Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/oracle-users. For more options, visit https://groups.google.com/d/optout.
