Jensen Hughes - Cybersecurity Analyst
Upload My Resume
Drop here or click to browse · PDF, DOCX, DOC, RTF, TXT
Requirements
• + 3–6 years of experience in cybersecurity, with strong focus on vulnerability management • Rapid7, CrowdStrike, or similar tools • Vulnerability lifecycle • Patch management processes • Experience working with IT teams to drive remediation • Strong attention to detail and follow-through • Experience in compliance-driven environments (CMMC, NIST) • Windows and Linux systems • Azure / AWS environments • Exposure to endpoint security and identity/access controls • Key outcomes • Consistent and predictable vulnerability management cadence • Reduction in critical and high-risk vulnerabilities • Improved SLA adherence for remediation • Clear and accurate vulnerability reporting • Reduced backlog of aged vulnerabilities • Increased contribution to overall cybersecurity operations • Please note that the salary range provided is a good faith estimate for the position at the time of posting and not a guarantee of compensation. Final compensation may vary based on factors, including but not limited to, responsibilities of the job, education, experience, knowledge, skills, and abilities, geographic location, internal equity, alignment with market data. • Jensen Hughes offers a competitive total rewards package, which includes a retirement plan, healthcare coverage, and a broad range of other benefits. Incentives and/or benefit packages may vary depending on the position and location.
Responsibilities
• Vulnerability management (primary focus) • Operate vulnerability management tools • Run and manage regular vulnerability scans across infrastructure, endpoints, and applications • Analyze and prioritize vulnerabilities using CVSS and business context • Maintain a consistent vulnerability management cadence (weekly/monthly cycles) • Drive reduction of critical and high-risk vulnerabilities • Remediation coordination & follow-through • Partner with IT, Cloud, and Enterprise Applications teams to drive remediation • Assign and track vulnerabilities to system owners • Follow up on remediation based on defined SLAs • Escalate overdue or high-risk vulnerabilities • Improve remediation turnaround times • Reporting & program visibility • Maintain dashboards and reports for vulnerability status • Open vulnerabilities • Remediation progress • Support executive reporting with clear summaries • Security operations support (secondary scope) • Support endpoint security monitoring and enforcement • Assist with identity and access reviews • Participate in basic security incident triage (as needed) • Support implementation of security controls across systems • Compliance & audit support • Support vulnerability-related compliance activities (CMMC, NIST) • Assist with evidence collection and audit readiness • Ensure vulnerability data aligns with compliance requirements • Program discipline & improvement • Establish and maintain a repeatable vulnerability management lifecycle • Improve data accuracy and tracking discipline • Reduce backlog of aged vulnerabilities • Identify opportunities to improve patching and remediation processes
Benefits
• $85,000—$90,000 USD
No credit card. Takes 10 seconds.