Cybersecurity Vulnerability Management Specialist

Svam International, Inc.· New York· Posted 2h ago· via Dice
Region USA
Apply Now

Job Description

DIRECT CLIENT REQUIREMENT

Job Title: Cybersecurity Vulnerability Management Specialist

Duration: 12+ months

Location: NYC, NY or Mesa, AZ

Hybrid position (2 3 days per week onsite).

Summary

The Red Team Specialist will join Client s cybersecurity team with a primary focus on vulnerability management across the enterprise . The role is responsible for interpreting penetration test reports (largely produced by third-party vendors), driving remediation across system owners, validating fixes, and reporting on the organization s overall vulnerability posture. A working understanding of penetration testing is required so the candidate can credibly translate findings into actionable remediation work, and a limited amount of internal hands-on testing may also fall under this role.

Key Responsibilities

- Vulnerability Management (Primary Focus)

- Own the end-to-end vulnerability management lifecycle: discovery, triage, prioritization, assignment, remediation tracking, and validation .

- Read, interpret, and operationalize penetration test reports delivered by third-party vendors translating findings into clear, actionable remediation tasks for system owners, developers, and infrastructure teams.

- Build and maintain vulnerability dashboards and reports, including CVE tracking, aging analysis, and trend reporting for technical and executive audiences .

- Use Tanium for vulnerability identification, patch management, and reporting (preferred; training available for the right candidate).

- Partner with patch management, infrastructure, and application teams to ensure timely remediation aligned with risk severity.

- Provide guidance on vulnerabilities using a risk-based approach considering ease of exploitation, exposure, and business impact.

- Validate remediation efforts and confirm vulnerabilities have been effectively closed.

- Identify opportunities for improvement in tools such as SecurityScorecard and similar external risk-rating platforms.

Third-Party Penetration Test Coordination

- Manage relationships with third-party penetration testing vendors, including scoping, scheduling, and execution oversight.

- Apply Client s internal penetration testing framework across the application onboarding lifecycle.

- Manage deliverables from external testers; review findings, ensure supporting evidence is sufficient, and defend or challenge findings as appropriate.

- Track and report on third-party testing engagements, including risk, mitigation strategies, and references.

Limited Internal Penetration Testing

- Note: Internal hands-on testing will be minimal. The candidate should be capable of supporting it but will not perform deep offensive operations day-to-day.

- Conduct light-touch internal penetration tests and vulnerability assessments of servers, web applications, and databases as needed.

- Provide spot-checking and validation of existing technical security controls.

- Communicate technical findings and remediation steps with developers, system administrators, project managers, and senior stakeholders.

Purple Teaming & Incident Response Support

- Support purple team exercises that bring collaboration between Security, Operations, and Business Units to validate technical controls and remediation effectiveness.

- Participate in incident response activities, including tabletop exercises and major incident remediation.

- Provide guidance to the security operations team on adversary techniques and procedures (TTPs) to improve awareness and response times.

Required Experience & Skills

- 2+ years of experience in cybersecurity , with a working knowledge of penetration testing concepts and the ability to read, interpret, and act on penetration test reports.

- Hands-on experience managing a vulnerability management program prioritization, remediation tracking, and reporting.

- Familiarity with web application, infrastructure, and basic cloud (AWS and/or Azure) vulnerability concepts.

- Working knowledge of Windows/Active Directory and Linux systems administration and common vulnerabilities .

- Familiarity with OWASP Top Ten, NIST, and MITRE ATT&CK frameworks.

- Working proficiency in at least one scripting language: Bash, PowerShell, or Python.

- Strong written and verbal communication skills able to clearly articulate technical findings and remediation requirements to mixed audiences (engineers through senior stakeholders).

- Demonstrated ability to drive remediation across cross-functional teams.

Certifications (Any of the Following Are a Plus)

- Practical/offensive: OSCP, eCPTX, eCPPX, PNPT, GPEN, eCXD, CEH, PenTest+

- Defensive: BTL1, BTL2

- Cloud security: AWS Certified Security Specialty or Azure equivalent

Preferred (Strong Pluses, Not Required)

- Tanium experience: Building reports, tracking CVEs, and supporting vulnerability and patching workflows. Client is a Tanium reseller and uses Tanium heavily this is a significant plus.

- CrowdStrike experience: Hands-on familiarity with CrowdStrike Falcon (EDR) is a strong plus.

- Exposure to penetration testing or red teaming engagements (web apps, APIs, network devices, databases, OS, cloud).

- Experience with NIST 800-53 and the Risk Management Framework (RMF).

- 1+ years of SOC and/or incident response experience, with a focus on host data acquisition and threat hunting.

- Familiarity with penetration testing toolsets (Burp Suite, NessQualys, Kali Linux, Metasploit, Cobalt Strike) at a level sufficient to interpret vendor outputs.

- Bachelor s degree in computer science, Engineering, Information Systems, or related field.

Please submit the following in the notes section when you submit the resume

Submission format for all resumes:

Full Name of the candidate:

Work Authorization:

Availability:

Rate: $/hr all-inclusive without Benefits

Current location:

Contact:

Email:

LinkedIn URL:

Reason for Job Change:

Project End date:

Regards,

Kapil Thapa

Sr. Manager US IT Recruitment

SVAM International | 233 East Shore Road | Suite # 201,Great Neck, NY 11023

Cell: ext 108| Fax: | Email: |

CMMI Level 5 | ISO 9001:2008 |ISO 27001:2013 Company | LISA Award winner

First seen 2026-05-11 08:40:01 · Last verified 2026-05-11 08:40:01

Pentest Careers · pentestcareers.com

Get new pentesting jobs in your inbox