Role Overview :
The Vulnerability Engineer assesses information risk and facilitates remediation of identified vulnerabilities with Smith & Nephew network, systems and applications.
S / he reports on findings and recommendations for corrective action. In this capacity, this individual performs vulnerability assessments utilizing IT security tools and methodologies.
This highly visible employee facilitates and monitors performance of risk remediation tasks, changes related to risk mitigation and reports on findings.
The Vulnerability Engineer maintains oversight of IT and vendors regarding the security maintenance of their systems and applications.
S / he provides weekly project status reports, including outstanding issues. In this role, this individual assists in all IT audits, IT risk assessments, and regulatory compliance.
20%) Engineer, implement and monitor security measures for the protection of computer systems, networks and information
20%) Identify and define system security requirements
20%) Design computer security architecture and develop detailed cyber security designs
5%) Prepare and document standard operating procedures and protocols
5%) Configure and troubleshoot security infrastructure devices
5%) Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
5%) Ensure that the company knows as much as possible, as quickly as possible about security incidents
5%) Security Incidents help incident response team with security incidents as needed.
10%) Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement
5%) On Call for Security Incidents as needed
Bachelor's degree in computer science, information systems and / or equivalent formal training or work experience. Three (3) years of experience in IT information security.
Licenses / Certifications :
Current CISSP, CRISC, CISA, GIAC or equivalent certification preferred.
SANS-related certifications Education
3+ years of experience as a Vulnerability Engineer or information security engineer.
1 + years with Tenable.io and Vulnerability Management.
1+ years of experience in building and maintaining security systems
1+ years of experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc
Detailed technical knowledge of database and operating system security
Experience with network security and networking technologies and with system, security, and network monitoring tools
Thorough understanding of the latest security principles, techniques, and protocols
Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network / web related protocols
Problem solving skills and ability to work under pressure
Working experience with Agile, SAFe, CI / CD, DevSecOps
Experience with vulnerability management and risk assessment
Knowledge of cyber security standard frameworks such as ISO and NIST
Experience with different cloud computing platforms and the cloud security framework.
Excellent written and oral communication skills.
Excellent customer service skills and problem resolution.
Experience in being able to manage and prioritize multiple tasks in an effective manner.
Ability to work independently without daily direction.
Understanding of back-channels typically used by actors for malicious activity.
Understanding of obfuscation techniques and best practices for ensuring device non-attribution.
Understanding of one or more Technology Platforms (Windows, Linux, Middleware Applications, Database Applications) - specifically as they apply to successful security control mitigation and particularly to vulnerability management.
Understanding of distributed denial of service attack intelligence gathering, concepts, mitigation tools, and techniques.
Understanding of mobility security device and application risk and threat assessment.
Understanding of nation and non-nation state actors, hacktivist groups, advanced threats, and the "kill chain" methodology.
Familiarity with secure coding best practices.
Strong communication & organizational skills, ability to multi-task, strong attention to details, excellent problem solving and follow-up skills required.
Key Skills and Responsibilities (SFIA Based) :
ASUP Level 4 Maintains application support processes, and checks that all requests for support are dealt with according to agreed procedures.
Uses application management software and tools to investigate issues, collect performance statistics and create reports.
SCAD Level 4 Maintains security administration processes and checks that all requests for support are dealt with according to agreed procedures.
Provides guidance in defining access rights and privileges. Investigates security breaches in accordance with established procedures and recommends required actions and supports / follows up to ensure these are implemented.
HSIN - Level 3 Installs or removes hardware and / or software, using supplied installation instructions and tools including, where appropriate, handover to the client.
Conducts tests, corrects malfunctions, and documents results in accordance with agreed procedures. Reports details of all hardware / software items that have been installed and removed so that configuration management records can be updated.
Provides assistance to users in a professional manner following agreed procedures for further help or escalation. Reviews change requests.
Maintains accurate records of user requests, contact details and outcomes. Contributes to the development of installation procedures and standards.
INAN - Level 4 Applies a range of mathematical, statistical, predictive modelling or machine-learning techniques in consultation with experts if appropriate, and with sensitivity to the limitations of the techniques.
Selects, acquires and integrates data for analysis. Develops data hypotheses and methods, trains and evaluates analytics models, shares insights and findings and continues to iterate with additional data.
SCTY Level 4 Explains the purpose of and provides advice and guidance on the application and operation of elementary physical, procedural and technical security controls.
Performs security risk, vulnerability assessments, and business impact analysis for medium complexity information systems.
Investigates suspected attacks and manages security incidents. Uses forensics where appropriate.
DATM Level 4 Takes responsibility for the accessibility, retrievability, security, quality, retention and ethical handling of specific subsets of data.
Assesses the integrity of data from multiple sources. Provides advice on the transformation of data / information from one format or medium to another.
Maintains and implements information handling procedures. Enables the availability, integrity and searchability of information through the application of formal data and metadata structures and protection measures.
Manipulates specific data from information services, to satisfy defined information needs.
Travel Requirements : 10 25%