Description Responsibilities: Proactively manage the Vulnerability Management program, acting as a leader and subject matter expert across its lifecycle. Stay updated on new and upcoming vulnerabilities and coordinate with teams to determine their impact. Develop a Threat Model and iteratively search through systems and networks to detect advanced threats. Influence the development of vulnerability management standards and security policies. Assist in the development of new security controls to address findings, including signatures, alerts, workflows, and automation. Identify security risks, threats, misconfigurations, and vulnerabilities of existing networks, systems, and applications, and assist in developing solutions to remediate identified threats. Analyze identified malicious network and system log activity to determine weaknesses and exploitation methods. Establish and drive metrics, analytics, reporting, and a roadmap for continual program improvement through executive summaries and in-depth technical reports. Develop and maintain automated situational awareness dashboards for leadership and system owners. Assist and support in incident handling/investigations. Collaborate with the technology engineering and management teams to resolve cyber threats and patch security systems.Requirements Proven experience building, leading and growing a Vulnerability/Threat Management function. Solid working knowledge of use scanning and threat detection technologies such as Endpoint Detection and Response, Security Information and Event Management (SIEM), VM scanners, and related security and asset tools. Broad, strong technical expertise in network protocols, vulnerability management processes, Windows and Linux based systems, enterprise network security products. Ability to analyze architectural documents. Experience consuming and analyzing Cyber Threat Intelligence tools. Experience working with various technologies and platforms such as AWS, Azure, O365, containers, etc. Understanding current cyber threat landscape, the different tactics commonly used by adversaries and how one would investigate, contain, and recover against their attacks. Familiarity with scripting languages such as Python, Ruby, Shell, Bash, Perl are a plus. Technology Doesn't Change the World, People Do.® Robert Half is the world’s first and largest specialized talent solutions firm that connects highly qualified job seekers to opportunities at great companies. We offer contract, temporary and permanent placement solutions for finance and accounting, technology, marketing and creative, legal, and administrative and customer support roles.Robert Half works to put you in the best position to succeed. We provide access to top jobs, competitive compensation and benefits, and free online training. Stay on top of every opportunity - whenever you choose - even on the go. Download the Robert Half app (https://www.roberthalf.com/us/en/mobile-app) and get 1-tap apply, notifications of AI-matched jobs, and much more.All applicants applying for U.S. job openings must be legally authorized to work in the United States. Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance. Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan. Visit roberthalf.gobenefits.net for more information.© 2024 Robert Half. An Equal Opportunity Employer. M/F/Disability/Veterans. By clicking “Apply Now,” you’re agreeing to Robert Half’s Terms of Use (https://www.roberthalf.com/us/en/terms) .