Tallo logoTallo logo

Cybersecurity Vulnerability Management Specialist

Job

Svam International, Inc.

New York, NY (In Person)

Full-Time

Posted 2 days ago (Updated 6 hours ago) • Actively hiring

Expires 6/8/2026

Apply for this opportunity

This job application is on an outside website. Be sure to review the job posting there to verify it's the same.

Review key factors to help you decide if the role fits your goals.
Pay Growth
?
out of 5
Not enough data
Not enough info to score pay or growth
Job Security
?
out of 5
Not enough data
Calculating job security score...
Total Score
82
out of 100
Average of individual scores

Were these scores useful?

Skill Insights

Compare your current skills to what this opportunity needs—we'll show you what you already have and what could strengthen your application.

Job Description

DIRECT CLIENT REQUIREMENT
Job Title:
Cybersecurity Vulnerability Management Specialist Duration:
12+ months
Location:
NYC, NY or Mesa, AZ Hybrid position (2 3 days per week onsite). Summary The Red Team Specialist will join Client s cybersecurity team with a primary focus on vulnerability management across the enterprise . The role is responsible for interpreting penetration test reports (largely produced by third-party vendors), driving remediation across system owners, validating fixes, and reporting on the organization s overall vulnerability posture. A working understanding of penetration testing is required so the candidate can credibly translate findings into actionable remediation work, and a limited amount of internal hands-on testing may also fall under this role. Key Responsibilities Vulnerability Management (Primary Focus) Own the end-to-end vulnerability management lifecycle: discovery, triage, prioritization, assignment, remediation tracking, and validation . Read, interpret, and operationalize penetration test reports delivered by third-party vendors translating findings into clear, actionable remediation tasks for system owners, developers, and infrastructure teams. Build and maintain vulnerability dashboards and reports, including CVE tracking, aging analysis, and trend reporting for technical and executive audiences . Use Tanium for vulnerability identification, patch management, and reporting (preferred; training available for the right candidate). Partner with patch management, infrastructure, and application teams to ensure timely remediation aligned with risk severity. Provide guidance on vulnerabilities using a risk-based approach considering ease of exploitation, exposure, and business impact. Validate remediation efforts and confirm vulnerabilities have been effectively closed. Identify opportunities for improvement in tools such as SecurityScorecard and similar external risk-rating platforms. Third-Party Penetration Test Coordination Manage relationships with third-party penetration testing vendors, including scoping, scheduling, and execution oversight. Apply Client s internal penetration testing framework across the application onboarding lifecycle. Manage deliverables from external testers; review findings, ensure supporting evidence is sufficient, and defend or challenge findings as appropriate. Track and report on third-party testing engagements, including risk, mitigation strategies, and references.
Limited Internal Penetration Testing Note:
Internal hands-on testing will be minimal. The candidate should be capable of supporting it but will not perform deep offensive operations day-to-day. Conduct light-touch internal penetration tests and vulnerability assessments of servers, web applications, and databases as needed. Provide spot-checking and validation of existing technical security controls. Communicate technical findings and remediation steps with developers, system administrators, project managers, and senior stakeholders. Purple Teaming & Incident Response Support Support purple team exercises that bring collaboration between Security, Operations, and Business Units to validate technical controls and remediation effectiveness. Participate in incident response activities, including tabletop exercises and major incident remediation. Provide guidance to the security operations team on adversary techniques and procedures (TTPs) to improve awareness and response times. Required Experience & Skills 2+ years of experience in cybersecurity , with a working knowledge of penetration testing concepts and the ability to read, interpret, and act on penetration test reports. Hands-on experience managing a vulnerability management program prioritization, remediation tracking, and reporting. Familiarity with web application, infrastructure, and basic cloud (AWS and/or Azure) vulnerability concepts. Working knowledge of Windows/Active Directory and Linux systems administration and common vulnerabilities . Familiarity with OWASP Top Ten, NIST, and
MITRE ATT&CK
frameworks. Working proficiency in at least one scripting language: Bash, PowerShell, or Python. Strong written and verbal communication skills able to clearly articulate technical findings and remediation requirements to mixed audiences (engineers through senior stakeholders). Demonstrated ability to drive remediation across cross-functional teams. Certifications (Any of the Following Are a Plus)
Practical/offensive:
OSCP, eCPTX, eCPPX, PNPT, GPEN, eCXD, CEH, PenTest+
Defensive:
BTL1, BTL2
Cloud security: AWS Certified Security Specialty or Azure equivalent Preferred (Strong Pluses, Not Required) Tanium experience: Building reports, tracking CVEs, and supporting vulnerability and patching workflows. Client is a Tanium reseller and uses Tanium heavily this is a significant plus.
CrowdStrike experience:
Hands-on familiarity with CrowdStrike Falcon (EDR) is a strong plus. Exposure to penetration testing or red teaming engagements (web apps, APIs, network devices, databases, OS, cloud). Experience with NIST 800-53 and the Risk Management Framework (RMF). 1+ years of SOC and/or incident response experience, with a focus on host data acquisition and threat hunting. Familiarity with penetration testing toolsets (Burp Suite, NessQualys, Kali Linux, Metasploit, Cobalt Strike) at a level sufficient to interpret vendor outputs. Bachelor s degree in computer science, Engineering, Information Systems, or related field. Please submit the following in the notes section when you submit the resume Submission format for all resumes: Full Name of the candidate:
Work Authorization:
Availability:
Rate:
$/hr all-inclusive without Benefits Current location:
Contact:
Email:
LinkedIn URL:
Reason for
Job Change:
Project End date: Regards, Kapil Thapa Sr. Manager US IT Recruitment SVAM International | 233 East Shore Road | Suite # 201,Great Neck, NY 11023
Cell:
ext 108|
Fax:
|
Email:
| CMMI Level 5 |
ISO 9001
2008 |
ISO 27001
2013 Company | LISA Award winner

Similar remote jobs

Similar jobs in New York, NY

Similar jobs in New York