What are the responsibilities and job description for the Vulnerability Management Analyst position at Motion Recruitment?
A global Technology company that specializes in cloud computing, cybersecurity, and content delivery network systems is actively searching for a Vulnerability Management Analyst to join their dynamic team.
This role is a 6-month contract with contract to hire potential. It is a remote opportunity but must be willing to work eastern standard hours. Be part of this international team where you will play a critical role in safeguarding the companies and their customers digital assets and infrastructure.
Required Skills & Experience
- US Citizenship is required
- Experience Level: 3-5 years in a senior technical security role.
- Vulnerability Management: Understanding CVSS scores, exploitability, and mitigation strategies.
- Threat Analysis: Ability to assess malware, reverse engineering, and incident triage.
- Infrastructure Knowledge: DNS, network connectivity, and system architecture.
- Compliance Acumen: Familiarity with FedRAMP, IL-5, and related frameworks.
- Tool Familiarity: While not directly using Splunk, candidates must understand how to interpret and act on Splunk alerts.
- Have performed tasks like pen testing, malware analysis, or infrastructure hardening.
Desired Skills & Experience
- Secret clearance preferred (must be cleared by December 2025)
What You Will Be Doing
Key Responsibilities:
- Enhance and automate the vulnerability management lifecycle with a focus on compliance and scalability for FedRAMP IL5-authorized systems.
- Lead remediation efforts and provide advanced support for scanning and vulnerability reporting issues, particularly in IL5-compliant environments.
- Analyze and prioritize vulnerability findings, offering recommendations tailored to the stringent security requirements of FedRAMP IL5.
- Maintain a strong understanding of vulnerabilities, exploits, and associated mitigations within Defense and Federal systems.
- Serve as a subject matter expert (SME) for vulnerability management and secure configurations across cloud and hybrid systems governed by FedRAMP IL5 standards.
- Evaluate the potential impact of vulnerabilities specific to Akamai’s IL5 environments and design appropriate compensating controls.
- Ensure scan results are integrated into dashboards and reporting pipelines aligned with FedRAMP IL5 audit and compliance needs.
- Triage scan results from web apps, systems, networks, and databases, with a strong focus on minimizing false positives and maintaining compliance.
- Integrate security tools, standards, and automation into the vulnerability management process to support Defense Edge and similar IL5-authorized platforms.
Applicants must be currently authorized to work in the US on a full-time basis now and in the future.