There is currently no job description for Vulnerability Management Analyst, be the first to
submit
the job responsibilities for Vulnerability Management Analyst.
There is currently no job description for Vulnerability Management Specialist, be the first to
submit
the job responsibilities for Vulnerability Management Specialist.
The Vulnerability Tester IV conducts manual and automated penetration tests including black-box, gray-box, and white-box. Performs penetration testing to assess and identify security vulnerabilities of networks, applications, and systems. Being a Vulnerability Tester IV documents testing results and presents suggestions for the development of countermeasures, security improvements, and mitigation strategies. Evaluates findings and performs root cause analysis to identify weaknesses, misconfigurations, or other flaws in the environment that could lead to security compromises. In addition, Vulnerability Tester IV utilizes a variety of assessment tools, such as Nmap, BurpSuite, Kali Linux and scripting languages like Bash, Python, Perl, or Ruby. Familiar with red team testing protocols and cybersecurity frameworks like OWASP, OSSTMM and PTES. Stays up to date with the latest security threats, techniques, and tools to continuously improve penetration testing methodologies. Typically requires a bachelor's degree in computer science. May require GIAC Penetration Tester (GPEN), GIAC Web Application Penetration Tester (GWAPT), and/or Offensive Security Certified Professional (OSCP) certificate. Typically reports to a manager. Being a Vulnerability Tester IV work is highly independent. May assume a team lead role for the work group. A specialist on complex technical and business matters. Working as a Vulnerability Tester IV typically requires 7+ years of related experience.
The Vulnerability Tester I conducts manual and automated penetration tests including black-box, gray-box, and white-box. Performs penetration testing to assess and identify security vulnerabilities of networks, applications, and systems. Being a Vulnerability Tester I documents testing results and presents suggestions for the development of countermeasures, security improvements, and mitigation strategies. Evaluates findings and performs root cause analysis to identify weaknesses, misconfigurations, or other flaws in the environment that could lead to security compromises. In addition, Vulnerability Tester I utilizes a variety of assessment tools, such as Nmap, BurpSuite, Kali Linux and scripting languages like Bash, Python, Perl, or Ruby. Familiar with red team testing protocols and cybersecurity frameworks like OWASP, OSSTMM and PTES. Stays up to date with the latest security threats, techniques, and tools to continuously improve penetration testing methodologies. Typically requires a bachelor's degree in computer science. May require GIAC Penetration Tester (GPEN), GIAC Web Application Penetration Tester (GWAPT), and/or Offensive Security Certified Professional (OSCP) certificate. Typically reports to a manager. Being a Vulnerability Tester I work is closely managed. Works on projects/matters of limited complexity in a support role. Working as a Vulnerability Tester I typically requires 0-2 years of related experience.
The Vulnerability Tester II conducts manual and automated penetration tests including black-box, gray-box, and white-box. Performs penetration testing to assess and identify security vulnerabilities of networks, applications, and systems. Being a Vulnerability Tester II documents testing results and presents suggestions for the development of countermeasures, security improvements, and mitigation strategies. Evaluates findings and performs root cause analysis to identify weaknesses, misconfigurations, or other flaws in the environment that could lead to security compromises. In addition, Vulnerability Tester II utilizes a variety of assessment tools, such as Nmap, BurpSuite, Kali Linux and scripting languages like Bash, Python, Perl, or Ruby. Familiar with red team testing protocols and cybersecurity frameworks like OWASP, OSSTMM and PTES. Stays up to date with the latest security threats, techniques, and tools to continuously improve penetration testing methodologies. Typically requires a bachelor's degree in computer science. May require GIAC Penetration Tester (GPEN), GIAC Web Application Penetration Tester (GWAPT), and/or Offensive Security Certified Professional (OSCP) certificate. Typically reports to a manager. Being a Vulnerability Tester II occasionally directed in several aspects of the work. Gaining exposure to some of the complex tasks within the job function. Working as a Vulnerability Tester II typically requires 2-4 years of related experience.