|Preferred GIAC Certifications||GEVA, GWAPT, or GDAT|
|Contact Name||Matthew Frick|
When you think of InComm Payments, think of Innovative Payment Technology. We were founded 25 years ago and continue to be a pioneer in the payment (FinTech) industry. Since our inception, we have grown to be a team of over 2,500 employees in 30 countries around the world. We own over 386 global technical patents and a network that includes over 500,000 points of retail distribution that points to our industry expertise.
InComm Payments works with the most recognized and valued brands in the world, and we are partnered with most of the world’s leading merchants. InComm Payments is highly focused on our people and their growth, and we work hard to make a career at InComm Payments meaningful and rewarding. We value innovation, quality, passion, integrity and responsibility in all that we do, and we are looking for great people to join our team as we move forward towards a very bright future.
About This Opportunity
The Vulnerability Analyst III will be responsible for optimization of vulnerability management tools as well as assessment, triage, and prioritization of defects identified by those tools. This includes engagement with system and application owners to advise of necessary remediations and analyze potential mitigations and workarounds. Additionally, as part of the overall program, this resource will contribute to data science and orchestration initiatives designed to increase automation and produce meaningful, actionable insights regarding the InComm attack surface.
This position must be well-versed in core application, systems, and network technologies as a basis for understanding the mechanisms and impacts of vulnerabilities afflicting common platforms. Intellectual curiosity for evolving attack and defense techniques is needed to accurately assess the damage potential and ease of exploit for vulnerabilities that reside within the InComm environment.
Feel free to reach out directly to the hiring manager: Matthew Frick, email@example.com
Tune vulnerability scanner configurations.
Engage vendor support as needed for troubleshooting and collaborate with peers to design, implement, and maintain optimally effective vulnerability assessment tools.
Capture knowledge and perform peer review of knowledge articles to establish and maintain effective wiki-based procedure documentation and support efficient processes.
Research vendor advisories and industry publications to obtain and communicate a detailed understanding of vulnerability expressions and necessary mitigations.
Consult with remediators to provide guidance as needed throughout the remediation process.
Evaluate false positive detections and drive effective dialogue to establish technical ground truth and evaluate corresponding risk associated with requested remediation deferrals.
Validate vulnerability scan behavior and necessary remediation actions in a hands-on lab environment.
Configure vulnerability orchestration tools to make effective use of data and implement accurate business logic.
Automate collection of vulnerability data gathered via APIs.
Parse data programmatically for extract/transform/load (ETL) purposes.
Design, implement, optimize, and iterate data warehouse schema to support vulnerability management.
Create visualizations using business intelligence tools.
Think with a security mindset while successfully analyzing business risk and remediation effort, to prioritize efforts and projects and not impact productivity.
Partner with other leaders and business project sponsors to build consensus on project requirements, expected timelines, and service delivery goals as well as report on status and key project risks.
Communicate highly technical content to various audiences ranging from client engineers to executive management, including mixed audiences.
Hands-on experience designing, implementing, and maintaining infrastructure vulnerability assessment tools such as Qualys, Tenable, or Rapid7
Knowledge of kill chain attack methodology and the MITRE ATT&CK and D3FEND frameworks.
Experience performing risk assessments, making relative comparisons of risk severity, and influencing prioritization decisions for information security initiatives.
Demonstrated track record of effectively researching vulnerabilities by synthesizing data from vendor advisories and other industry publications.
Familiarity with vulnerability orchestration tools is a plus, but not required.
Experience with a business intelligence platform such as Power BI or Tableau.
Ability to script in Python or PowerShell to gather data from REST APIs and/or parse from one data format to another to support extract/transform/load (ETL) needs.
Familiarity with scripting in R is a plus, but not required.
Ability to automate simplistic and/or repetitive tasks with code.
Experience troubleshooting technologies to identify root cause in failure conditions.
Intellectual curiosity for new technical security topics and systems thinking for reasoning about value across adjacent technologies and processes.
Experience performing security architecture review and evaluating trade-offs in design and deployment decisions.
Experience consuming and/or producing deliverables such as gap analyses, RACI charts, data flow diagrams, process flow diagrams, and/or maturity scorecards.
Strong analytical skills.
Ability to communicate security-related concepts to a broad range of technical and non-technical staff both verbally and in writing.
Ability to manage multiple tasks simultaneously and meet established deadlines.
Ability to work productively while remote and communicate effectively in a virtual team environment.
7+ years IT experience
3+ years Information Security experience
Education & Certifications
A Bachelor’s degree in Information Security, Computer Science, Information Systems, or another related field is preferred, but not required.
One or more certifications such as CEH, OSCP, GEVA, GWAPT, or GDAT are preferred, but not required. Career development plan to include certifications upon hire.
OLS/InComm is an equal employment opportunity employer. We adhere to a policy of making employment decisions without regard to race; color; religion; national origin; sex; sexual orientation; pregnancy, childbirth, or related medical conditions; age; disability or handicap; citizenship status; service member status; or any other category protected by federal, state, or local law.