*Hi* *Please go through the below position and if you feel comfortable, then please send me your updated resume*
*Position : Sr. Vulnerability Engineer* *Location : Minneapolis, MN* *Duration : 6+ Months* *Interview : Phone and Skype* *This is a backfill for our Sr. Engineer* who has been repurposed to the CIH project Is this person a sole contributor or part of a team? Part of a team If so, please describe the team? (Name of team, size of team, etc.) *Vulnerability Mgmt - 11 onsite, 9 offshore What are the top 5-10 responsibilities for this position? (Please be detailed as to what the candidate is expected to do or complete on a daily basis)* · Define, implement, and support the vulnerability management capabilities for United Health Group, its affiliates, and customers which include the following: · Vulnerability Scanning - configuring vulnerability assessment tools, performing scans, researching and analyzing vulnerabilities, identifying relevant threats, summarizing and reporting results. · Configuration Compliance Scanning - configuring compliance scanning tools, creating baseline tests, summarizing and reporting results. · Stakeholder Consulting · Provide vulnerability management consulting services, as needed, to various projects. · Build effective relationships with stakeholders who own and support security audit and compliance, security architecture and operations, and IT infrastructure. · Gain commitment from stakeholders and project teams to implement recommended security controls. · Platform management: · Perform life Cycle Management activities including proof of concept evaluations, product selection, coordination of technical refresh activities, inventory management, and decommission *What software tools/skills are needed to perform these daily responsibilities?* · BS in Computer Science or equivalent. · 3-5 years demonstrated expertise defining, implementing, and delivering threat and vulnerability management scanning tools (e.g. Tripwire, Rapid 7, Nessus, etc.) · 3-5 years demonstrated expertise defining, implementing, and delivering configuration compliance scanning tools (e.g. Tripwire, Rapid 7, Nessus, etc.) · Must be well versed in networking, operating systems (e.g. Linux, Windows, etc.), active directory, authorization and authentication, and databases. · Technical network (e.g. CCNA, CCNP Security) and security certifications highly desirable (e.g. CISA, CISSP, GCIH). · Understanding of controls (e.g. access control, auditing, authentication, encryption, and application security). · Ability to provide quality deliverables on time and on budget. · Ability to initiate, design, execute, and complete projects independently with minimal direction. · Must possess excellent communication skills (written, verbal) and be able to work effectively with technical and non-technical individuals alike. · Ability to mentor other employees to improve their skills and effectiveness. · Ability to solve problems independently · United States Citizenship - Ability to obtain favorable adjudication following submission of Department of Defense form SF86 NAC form SF86 (see below for details) [image: logo] *Ankush Nirala* | Technical Recruiter | Apetan Consulting LLC Tel: 201- 620- 9700* 112 | Mail: 72 Van Reipen Avenue # 255 Jersey City, NJ 07306 | Corp.Office: 15 Union Avenue, office # 6, Rutherford, New Jersey 07070 | ank...@apetan.com | G-talk: ankush...@gmail.com | www.apetan.com *[image: https://s3.amazonaws.com/images.wisestamp.com/icons/facebook.png]* <http://www.facebook.com/Apetanconsulting> *[image: https://s3.amazonaws.com/images.wisestamp.com/icons/linkedin.png]* <http://www.linkedin.com/company/apetan-consulting-llc?trk=top_nav_home> *[image: https://s3.amazonaws.com/images.wisestamp.com/icons/twitter.png]* <http://twitter.com/ApetanLLC> [image: e verify] *Disclaimer*: We respect your Online Privacy. This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. If you are not interested in receiving our e-mails then please reply with a "REMOVE" in the subject line at rem...@apetan.com and mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e mails to you. We are sorry for the inconvenience.