Overview:
The Configuration Management Lead Engineer is responsible for managing the identification, assessment, reporting, and mitigation of on prem and cloud misconfigurations and vulnerabilities. The focus will be on-prem and cloud Configuration assessment, reporting and governance including engagement with stakeholders across our Infrastructure and Application teams, third parties, and other internal departments and organizations to govern remediation of misconfigurations. This role will also be a technical lead responsible for guiding more Junior engineers.
Responsibilities:
- Take leading role in establishment and operationalization of an On-prem config Mgmt governance program.
- Provide vulnerability and misconfiguration remediation governance and operational support.
- Perform misconfiguration and vulnerability metrics reporting for ad-hoc and scheduled reports for various KPIs around configuration management activities.
- Drive and track remediation initiatives across multiple support teams.
- Respond to questions from stakeholders about remediation and configuration and vulnerability assessment results and actions.
- Collaborate with support groups/stakeholders on details about identified vulnerabilities.
Requirements:
- Evaluate and establish information security requirements by researching industry standards, conducting system security and vulnerability and configuration analyses, performing risk assessments, and analyzing architecture and platform configurations.
- Bachelor’s degree in Computer Science, Cybersecurity or other related field, or equivalent work experience.
- Proficient in various configuration and vulnerability assessment tools such as Qualys, Armis, Microsoft Defender for Endpoint/Cloud, Wix, Prisma Cloud or similar CSPM security tools, Microsoft Defender for Cloud and Endpoints other identified infrastructure tools is desirable.
- Ability to analyze vulnerability and configuration metrics using Microsoft Excel advanced techniques.
- 9+15 years of combined IT and security work experience with a broad range of exposure to cybersecurity, systems analysis, application development and/or systems administration and 5+ years of vulnerability or configuration management experience.
- Good understanding of industry standard regulations and risk management frameworks and standards (e.g., ISO, PCI, NIST, COBIT, GAPP, HIPAA, CIS, HI-TRUST, GDPR).
- Familiarity with SANS Top 25 controls, OWASP Top 10 and/or MITRE ATT&CK framework.
- Excellent communication skills: able to explain complex concepts clearly to both technical and non-technical stakeholders.
Certifications (Must Have):
- At least one certification from the list (details not provided in 'Certification: Must Have' section, but implied by 'At least one of the below').
- Recommended certifications from 'Certification: Good to Have' include: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certificate of Cloud Security Knowledge (CCSK), Offensive Security Certified Professional (OSCP) or other equivalent recognized security certifications. Cloud certifications like AZ-500 Azure Security Engineer are a plus.