Senior Cybersecurity Vulnerability Specialist
Job Purpose: The position is responsible for identifying technical security vulnerabilities by conducting application analysis, network analysis, and -scanning; reporting security vulnerabilities and the risks those vulnerabilities present to Vice Presidents, Managers, and other technical individuals; recommending mitigating solutions to remediate risk associated with vulnerabilities maintaining knowledge of cybersecurity trends and changing technologies, and providing recommendations for adaptation of new technologies for - vulnerability -monitoring; providing management with vulnerability assessments and security briefings to advise them of critical and high risk vulnerabilities that may affect customer, or corporate security objectives.
Required Job Qualifications:
*Bachelor Degree with 4 years IT security experience OR 6 years experience.
*Experience in the following: computer architecture, operating systems, inter-process communications, networking protocols and their related implementations.
*Experience with and understanding of compiled and interpreted programs and the types of security issues possible in each; database systems, web servers, application servers, mainframes, firewalls, routers, load balancers, switches, and different types of middleware; x86 assembly.
*Experience with debuggers and disassemblers; malware analysis through reverse engineering, protocol analysis, and log analysis; intrusion analysis through reverse engineering, log analysis, forensic disk examination, and system review.
*Verbal communications skills and concise written communication skills.
*Organization and multi-tasking skills.
Preferred Job Qualifications:
*Bachelors OR Masters Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience.
***Some remote work flexibility will be available for this position, as well.
Location: IL - Chicago
Activation Date: Wednesday, February 21, 2018
Expiration Date: Saturday, April 28, 2018
Associated topics: identity access management, iam, information technology security, leak, malicious, security engineer, security officer, threat, violation, vulnerability