X

Cyber Security Analyst - Vulnerability Management

XPT Software Australia Pty
Contract
On-site
Sydney, New South Wales, Australia
Cybersecurity & Compliance

Job Title: Vulnerability Management Security Specialist


Job Summary:

We are seeking a highly skilled and motivated Vulnerability Management Specialist to join our IT Security team. The ideal candidate will have extensive experience managing vulnerabilities across a diverse range of technologies, including Cisco Firepower, Cisco ASA, Ivanti Application Control, Endpoint Security, BIG-IP F5 (LTM, GTM, APM), and BIG-IQ F5. This role involves identifying, assessing, and mitigating security vulnerabilities to safeguard our infrastructure and applications.

 

Key Responsibilities:

1.       Vulnerability Assessment and Management:

o   Conduct regular vulnerability assessments on Cisco Firepower, Cisco ASA, Ivanti Application Control, Endpoint Security solutions, and BIG-IP F5 technologies.

o   Identify, evaluate, and prioritize vulnerabilities based on risk and impact.

o   Develop and implement remediation plans in collaboration with IT and security teams.

 

2.       Technology-Specific Duties:

o   Cisco Firepower: Manage vulnerability assessments and ensure timely patching and updates for Cisco Firepower systems.

o   Cisco ASA: Monitor and address security vulnerabilities in Cisco ASA firewalls and VPN appliances.

o   Ivanti Application Control: Oversee vulnerability management and policy enforcement for Ivanti Application Control.

o   Endpoint Security: Perform vulnerability assessments and manage security solutions for endpoint devices.

o   BIG-IP F5 (LTM, GTM, APM): Monitor and manage vulnerabilities in BIG-IP F5 load balancers, global traffic managers, and application delivery controllers.

o   BIG-IQ F5: Ensure the security of BIG-IQ F5 management systems and related configurations.

 

4.       Reporting and Documentation:

o   Create and maintain detailed reports on vulnerability assessments, remediation progress, and incident response activities.

o   Document security policies, procedures, and best practices for managing vulnerabilities.

 

5.       Collaboration and Communication:

o   Work closely with VM Team, network, and security teams to ensure effective vulnerability management and remediation.

o   Communicate vulnerability findings and remediation status to stakeholders and senior management.

 

6.       Continuous Improvement:

o   Stay current with emerging threats, vulnerabilities, and security technologies.

o   Recommend and implement improvements to vulnerability management processes and tools.