C2C requirement – Information Security Manager


Job Description
The primary work location(s) will be at 100% Remote, Work Location With-in the United States. The working position is Telework.
Vulnerability Inventory and Baseline Establishment
1. Review the Agency’s existing vulnerability data, including vulnerabilities identified through scanning, assessments, or other security tools.
2. Establish and maintain a consolidated vulnerability baseline.
3. Develop and document a remediation timeline for all identified vulnerabilities, reflecting current risk posture and aging.
Risk Classification and Prioritization
1. Ensure that vulnerabilities are categorized and prioritized based on risk, severity, exploitability, and potential impact to Agency operations.
2. Align vulnerability classification and prioritization to applicable NIST guidance.
3. Validate that remediation timeframes align with Agency established expectations for different vulnerability risk levels.
Remediation Coordination and Communication
1. Coordinate remediation activities with system, server, and application owners.
Tracking, Metrics, and Reporting
1. Maintain ongoing tracking of vulnerability remediation status.
2. Produce periodic status reports summarizing.
Validation and Closure
1. Validate remediation actions through available evidence, including vulnerability scan results or other supporting artifacts.
2. Confirm closure of vulnerabilities in tracking systems once remediation is completed and validated.
3. Ensure vulnerabilities that cannot be remediated within required timeframes are formally documented and supported by approved risk acceptance or exception documentation, in accordance with Agency policy.
Program Improvement Support
1. Identify process gaps, systemic issues, or control weaknesses affecting vulnerability remediation effectiveness.
2. Provide recommendations for improving vulnerability remediation processes and accountability, aligned with NIST standards and Agency governance requirements.
II. CANDIDATE SKILLS AND QUALIFICATIONS

Minimum Requirements:
Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.

Years
Required/Preferred
Experience
8
Required
Experience in Vulnerability Inventory and Baseline Establishment
8
Required
Experience in Risk Classification and Prioritization
8
Required
Experience in tracking vulnerability remediation
8
Required
Experience in producing status reports
8
Required
Experience in validating remediation actions through available evidence, including vulnerability scan results


Thanks & Regards,

Nikhil Manoj
Sr Recruiter
Aditi LLC

:
:
:
:
:


🔔 Get our daily C2C jobs / Hotlist notifications on WHATSAPP

About Author

I’m Monica Kerry, a passionate SEO and Digital Marketing Specialist with over 9 years of experience helping businesses grow their online presence. From SEO strategy, keyword research, content optimization, and link building to social media marketing and PPC campaigns, I specialize in driving organic traffic, boosting rankings, and increasing conversions. My mission is to empower brands with result-oriented digital marketing solutions that deliver measurable success.

Leave a Reply

Your email address will not be published. Required fields are marked *

×

Post your C2C job instantly

Quick & easy posting in 10 seconds

Keep it concise - you can add details later
Please use your company/professional email address
Simple math question to prevent spam