This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As a Vulnerability Management Analyst at Lam Research, you will play a critical role in execution of Vulnerability Management Program. An ideal candidate will be a subject matter expert in the VM Lifecycle Process and Reporting; with an ability to self-start while supporting and improving the overall Vulnerability Management Program for Lam’s assets on-prem, or cloud-hosted. The candidate must possess good understanding of tools, techniques, and procedures that modern attackers use and have required understanding of security frameworks and methodologies such as NIST, OWASP 10, SANS TOP 25, MITRE ATT&CK. This role requires the ability to work with teams across different time zones, including in APAC, EMEA, and North America. As a Vulnerability Management Analyst, you will play a crucial role in ensuring information security compliance, mitigating risks, and driving overall security excellence within the organization.
Job Responsibility:
Managing and executing day to day operations of our vulnerability management tools – including ensuring overall tool health and compliance, scheduling and executing scans, compiling and distributing reports, and tracking findings through resolution
Monitoring threat intelligence feeds and help detect 0-day vulnerabilities and coordinate appropriate and timely response
Service ownership will include ongoing understanding of current solution-set and make recommendations on improvements
Tool ownership will include ensuring appropriate configuration of the tools, scan sensors placement and compliance, timely scan cadence, appropriate coverage, detecting and highlighting gaps
Reporting findings to relevant stakeholders
Develop relationships with stakeholders both in management and across the business units
Classify and prioritize the risk of new vulnerabilities according to the specifics of our unique environment's risk level
Participate in impact assessments to help define prioritization and proper monitoring coverage
Develop automation, orchestration, and scripting to reduce manual processes
Analyze requirements to develop and manage program metrics and performance through reporting
Requirements:
Experience with scanning tools such as Microsoft Defender, Tenable, Rapid7, Qualys, etc, and their configurations
Prior experience in systems or network administration, or understanding of requirements of such roles, including enterprise configurations of these areas
Certified in one of the security certifications like CEH/CISSP/OSCP
Experience with data analytics with the ability to provide qualitative analysis and recommendations
Ability to develop strong working relationships with a variety of other enabling teams
Strong attention to detail, data accuracy, and data analysis
Self-motivated and operates with a high sense of urgency and a high level of integrity
Ability to automate technical tasks using API or scripting
Strong verbal and written communication skills
Nice to have:
Bachelor’s degree in computer science, Information Technology, Cyber Security, or 5+ years of Cybersecurity experience with a concentration in vulnerability management
Understanding a variety of technical concepts such as Networking, Systems Administration, Application Development, and Information Security practices