Get C2C/W2 Jobs & hotlist update

Security Analyst C2c jobs GA/NC/IL/PA/TX/CO/ND/NY/KS/NJ/TN

Role – Security Analyst

Location – Alpharetta, GA; Charlotte, NC; Chicago, IL; Conshohocken, PA; Dallas, TX; Denver, CO; Fargo, ND; Garden City, NY; Houston, TX; Lenexa, KS; Lubbock, TX; Morristown, NJ; Mt Juliet, TN; New York, NY; Purchase, NY; Topeka, KS

 


Role Summary:

The Security Analyst is responsible for independently managing third-party vulnerability data sources, executing scans using proprietary Sompo tools, and collaborating with IT teams to prioritize mitigation efforts. The role involves leveraging vulnerability management tools to generate metrics and reports that track progress and effectiveness. Additionally, the Security Analyst may contribute to reviewing project scopes to recommend security benchmarks, optimizing security tool alerts and policies, and integrating logs and large data sets into existing systems.

 

Responsibilities:

 

  • Analyze vulnerabilities from various sources and input them into the vulnerability management tool using approved methods to ensure a complete overview of exposures.
  • Evaluate existing vulnerabilities to find problem areas or opportunities for mass-mitigation.
  • Communicate with other teams to explain the opportunities or needs.
  • Escalate vulnerabilities that have breached our time-to-resolve limits.
  • Configure scanning tools and manage scan schedules.
  • Collect a set of metrics and KPIs for our departmental use.
  • Consider opportunities for AI to improve all of the above.

 


Technical Qualifications:

 

Strong familiarity and prior experience with:

  • HTTP, PKI and signatures/encryption, SMTP, DNS, CWEs, CVEs, and other frameworks.
  • Nessus, NMAP, ZAP, BurpSuite, Invicti, Nuclei or other scanning tools.
  • Web application scanning and web application firewalls.
  • Containers.
  • CIS benchmarks, STIGs, or other security hardening standards.

 


Additional desirable skills or experience:

  • SAML, Kerberos, OAuth, OIDC, LDAP.
  • PowerShell and Python.
  • Jenkins.
  • Splunk data onboarding– indexes, sourcetypes, data models, forwarders, apps, HECs.
  • Azure event hubs, Kafka, syslog.
  • Sentinel, Defender, Crowdstrike, or other EDRs.

 


 

Thanks

Yogesh Sharma K,

Reveille Technologies, Inc

yogesh@reveilletechnologies.com

About Author

I’m Monica Kerry, a passionate SEO and Digital Marketing Specialist with over 9 years of experience helping businesses grow their online presence. From SEO strategy, keyword research, content optimization, and link building to social media marketing and PPC campaigns, I specialize in driving organic traffic, boosting rankings, and increasing conversions. My mission is to empower brands with result-oriented digital marketing solutions that deliver measurable success.

Leave a Reply

Your email address will not be published. Required fields are marked *

×

Post your C2C job instantly

Quick & easy posting in 10 seconds

Keep it concise - you can add details later
Please use your company/professional email address
Simple math question to prevent spam