Vulnerability Assessment Analyst in Fort Lauderdale, FL at HUNTER Technical Resources

Date Posted: 7/18/2019

Job Snapshot

  • Employee Type:
  • Job Type:
  • Experience:
    Not Specified
  • Date Posted:
  • Job ID:

Job Description

Infrastructure Vulnerability Assessment Analyst


Duties will include providing vulnerability assessment and penetration testing services to the businesses globally through a comprehensive testing process, as well as identifying weaknesses and vulnerabilities within the system and proposing countermeasures. Typical assignments will involve testing of the overall security of critical infrastructure components and applications to ensure they comply with internal policies, security architecture best practices, and industry standards; scanning and discovering rouge hosts, networks, and devices; and scanning and discovering vulnerable systems and applications.


- Bachelor' s Degree with 3 - 7 years of experience on most of the following:
- Conducting vulnerability assessments and penetration testing (application and/or infrastructure) and articulating security issues to technical and non-technical audience
- Identifying, researching, validating, and exploiting various different known and unknown security vulnerabilities on server and client side 
- Vulnerability Assessment tools, e.g. Nessus, Qualys, etc
- Deep understanding of OSI model
- Security devices, e.g. Firewalls, VPN, AAA systems
- OS Security, e.g. Unix, Linux, Windows, Cisco, etc
- Understanding of common protocols, e.g. LDAP, SMTP, DNS, Routing Protocols
- Web application infrastructure, e.g. Application Servers, Web Servers, Databases
- Web development and programming languages i.e. Python, Perl, Ruby, Java, and/or .Net
- Reporting information security vulnerabilities to businesses

- Industry-accredited security certifications will be required (the candidate must have or be willing to obtain all of the following certifications – GIAC GXPN, GPEN, GCIH, CISSP, and CEH). Knowledge of tools and processes used to expose known and undocumented vulnerabilities in various different systems.