IT Security Sr. Advisor - Vulnerability Management
Dell is a collective of customer-obsessed, industry-leading visionaries. At our core is a commitment to diversity, sustainability and our communities. We believe in working together to build a brighter future, celebrating the entrepreneurial spirit that lives inside us all, and marrying innovation with action. Dell is proud to offer unparalleled growth and development opportunities for our team members. We believe that technology is essential for driving human progress, and we’re committed to providing that technology to people and organizations everywhere, so they can transform the way they work and live.Cerinte
Bachelor's degree in Computer Science, MIS or a related field of study
Minimum of 4 years of information technology experience and minimum of 4 years of information security experience
Knowledge IT and IT Security fundamentals and working knowledge of IT hosting services, firewalls, networking, servers, storage etc.
Hands on experience and knowledge of OWASP tools and methodologies and security attack vectors
Minimum of 2 years of experience in business management, along with the following skills: Ability to collaborate with business stakeholders to identify requirements and drive compliance with approved standards; The ability to work comfortably and successfully in a fast-paced environment with frequent changes in priorities; The ability to influence others or manage indirectly
Strong written (e.g., documentation) and verbal communication skills in English
Working knowledge of one or more relevant industry standards, frameworks, and practices; such as IT Service Management, ISO 27001, ISO 27002, COBIT, Sarbanes-Oxley (SOX) etc.
Collaborates with product and service groups to drive remediation of identified vulnerabilities or security controls gaps in Dell applications, software or infrastructure
Leads and drives remediation efforts with business and end users for all high and critical severity issues reported
Analyzes security issues, determine cause and impact and identify the corrective action needed to eliminate and prevent the event from happening in the future
Helps integrate information security controls into an environment to identify risks and reduce their impact
Reviews and follow-up on identified vulnerability remediation efforts, and validate successful implementation of the recommended mitigating controls
Recommends standards, policies, and/or procedures to correct deficiencies
Escalates to vendors, Security Team, and IT and Engineering through standard escalation processes