Vulnerability Management Architectother related Employment listings - San Francisco, CA at Geebo

Vulnerability Management Architect

Innovate here. And see your ideas come to life. It's an exciting time to work in tech at Edward Jones. We are making massive investments in emerging technologies to improve how we work with our clients and with each other. Relationships are the focus of our business model. And working in Technology here means using your skills to build, deliver and maintain the technologies that enable us to deepen and support those relationships. The best part? We develop and create our own industry-leading solutions internally. And you can be a part of it. Working with emerging new technologies. Creating platforms, programs and experiences that change how we work together - and support our client-first focus. Changing the future of our firm, the industry and the advisor-client relationship. Job Overview Skills/Requirements Awards & Accolades About Us Leverage industry and technology expertise to assist maturation of our vulnerability identification, management and reporting infrastructure. Establishing processes around identifying, cataloging, and validation of vulnerability data associated with software and infrastructure utilized in the environment. At Edward Jones, we value and respect our associates and their contributions, and we recognize individual efforts through a rewards program that promotes a long-term career, financial security and well-being.approach, which in addition to base salary, typically includes benefits, bonuses and profit sharing. The salary range for this role is based on national data and actual pay is based on skills, experience, education, and other relevant factors for a potential new associate:
Hiring Minimum:
$106,916 Hiring Maximum:
$182,047
Summary:
Leverage industry and technology expertise to assist maturation of our vulnerability identification, management and reporting infrastructure. Establishing processes around identifying, cataloging, and validation of vulnerability data associated with software and infrastructure utilized in the environment.
Responsibilities:
Integrate Vulnerability discovery tools with management platforms ( Ex:
Kenna, ServiceNow ) Develop dashboards and processes to monitor health of systems Analyze vulnerabilities to determine risk impact to systems Catalog database of assets types, operating systems, and applications utilized in the environment Introduce processes and automation for vulnerability reporting and remediation tasks. Assist development areas with remediation of vulnerabilities in code, open source libraries, and infrastructure assets Develop and improve key point indicators and metrics for vulnerability remediation Drive adoption of security tools and processes for vulnerability management Qualifications &
Experience:
Advanced experience working in large enterprise environment with diverse teams and technologies. Excellent communication skills with stakeholders regarding vulnerability assessments and remediation efforts. Advanced experience working with large datasets, databases, and hands on capabilities with scripting languages and API's. Advanced experience working with dashboards & reports for both technical and non-technical audiences. Understanding of software security issues, patch management, and supply chain processes. Advanced experience working with risk-based vulnerability management processes and tools. Advanced experience working with ticketing event and project management platforms. Advanced experience working with security orchestration and automation platforms. Advanced scripting knowledge (Python, Ruby, Powershell) and experience developing automation processes. In-depth knowledge around API interconnectivity and integration of systems. Experience working under compliance requirements
Salary Range:
$80K -- $100K
Minimum Qualification
Systems Architecture & Engineering, Software DevelopmentEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.