What you’ll be doing...

At Verizon we believe technology should help you achieve more. And we help businesses do exactly that almost daily — co-creating innovative connected products, rapidly and securely deploying apps in the cloud, managing employee-owned devices on a global scale, and deflecting sophisticated hacker attacks. In support of our world leading position in Cyber Security, we provide day to day operational support for customers’ Vulnerability Management (VM) processes.

Our service provides a designated and dedicated VM specialist as a full time resource, who works as a contact and communications point between our security services team and the customer’s security and IT staff. You will be responsible for helping the customer to maximize the effectiveness of VM, and helping with ongoing process optimization.

  • Work with the customer to determine and define the VM structure: team members (customer and third parties), responsibilities, reporting, and communication plans.
  • Define the VM process and procedures for the customer, including how the VM process receives, prioritizes, and handles from scan requests through lessons learned, and how the scans are scheduled and requested, results are communicated to asset owners, and remediation is tracked.
  • Assess the VM tools currently in use and provide recommendations for additional tools and possible changes for tuning to enhance the functionality and data generated from the tools and reports.
  • Integrate the VM process to customers’ existing information security processes and other relevant processes.
  • Identify key stakeholders and asset owners that will be required within the communications plan and remediation tracking components of the VM process.
  • Agree on common escalation paths and procedures between the customer and third parties that indicate who has authority to make major decisions, and under which circumstances are various actions appropriate.
  • Establish VM classification and prioritization criteria to be used in the communication of vulnerability information to asset owners, key stakeholders, and management.
  • Define the service Key Performance Indicators (KPI) that will be tracked and reported for VM related activities and service performance.
  • Track performance against KPIs.
  • Run the vulnerability management process.
  • Improve processes and tools based on feedback and lessons learned.
  • Deliver reports to customers regarding vulnerability scans, analysis or data, prioritization of assets for remediation, and status of remediation activities.
  • Receive and communicate threat intelligence information as appropriate.
  • Provide monthly and quarterly reporting on the KPIs.
  • Perform analysis of vulnerability scanning data and activities in accordance with the customer’s security VM process.
  • Create reports using customer provided VM tools and reporting criteria.
  • Classify and prioritize vulnerabilities.
  • Facilitate vulnerability communication with stakeholders and asset owners.
  • Analyze ongoing scan results and reports to track the status of remediation actions, and report on any remediation delays, escalating when appropriate.
  • Provide recommendations to the customer for possible enhancements to the VM process and toolset based on developments in the capabilities and functionality of VM related tools and technologies.

What we’re looking for...

You'll need to have:

  • Bachelor’s degree in Computer Science or related field, or four or more years of work experience.
  • Four or more years of relevant work experience.
  • Information security experience.
  • SANS or other Security certifications, such as GCIA, GCIH, GREM, GPEN, and CEH.

Even better if you have:

  • A degree.
  • CISSP or CISM certification.
  • Five or more years of information security experience with a strong focus on VM as well as technical certifications to reinforce your practical experience.
  • Knowledge of common types of malware, their infection vectors, how to identify them using network and host based tools, how to eradicate them and verify the success of eradication efforts.
  • Knowledge of current security threats and vulnerabilities, how to detect and mitigate them, and an ability to understand possible consequences on the customer’s environment.
  • Significant experience with how to structure and operate an efficient Incident Response process.
  • ITIL Foundations training / certification.
  • Strong communication skills and ability to engage with customers at both technical and executive levels.
  • Strong coordination and collaboration skills as well as a good technical and architectural understanding.
  • Clear and concise written and verbal communication skills, including the ability to produce professional-level documentation.
  • Strong problem-solving and security analytics skills and the ability to identify gaps in processes and recommend improvements for mitigation.
  • Strong leadership skills and a proactive approach to customer issues.
  • Ability to excel in dynamic, fast-paced environments.
  • Understanding of modern technologies used to detect malware and vulnerabilities and protect assets.
  • Understanding of modern network and cloud technologies.
  • Expertise in the field of vulnerability scanning, remediation, and ongoing threat analysis.

When you join Verizon...

You’ll be doing work that matters alongside other talented people, transforming the way people, businesses and things connect with each other. Beyond powering America’s fastest and most reliable network, we’re leading the way in broadband, cloud and security solutions, Internet of Things and innovating in areas such as, video entertainment. Of course, we will offer you great pay and benefits, but we’re about more than that. Verizon is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Verizon.

Equal Employment Opportunity

We're proud to be an equal opportunity employer- and celebrate our employees' differences,including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. Different makes us better.