Full-Time InfoSec Vulnerability Data Analyst
Experian is hiring a remote Full-Time InfoSec Vulnerability Data Analyst. The career level for this job opening is Experienced and is accepting Worldwide based applicants remotely. Read complete job description before applying.
Experian
Job Title
Posted
Career Level
Career Level
Locations Accepted
Share
Job Details
As an InfoSec Vulnerability Metrics & Data Analyst, you will provide data-driven insights contributing to our organization's security strategy and vulnerability management practices.
You will establish and maintain regional and global reports to support the Cloud and Application Attack Surface Management scope, embrace and integrate a threat-informed approach, and perform analytical reviews to enhance Experian's Cloud and Application Attack Surface Management.
You will join our Cloud and Application Attack Surface Management team and report to the Director of Attack Surface Management.
Your responsibilities include:
- Guide the development of vulnerability management metrics, gathering feedback and sharing metrics with senior leaders
- Evaluate and define functional requirements for vulnerabilities, flaws, and misconfiguration metrics
- Develop, maintain, and run advanced reporting, dashboard, and scorecard results
- Communicate metrics to system owners and partners on outstanding vulnerabilities, issues, and concerns
- Develop and automate vulnerability metrics with specific procedures for data collection, analysis, and charting, partnering with necessary teams
- Determine requirements for technical solutions and tools to implement Vulnerability Metrics
- Develop vulnerability KPIs and metrics to demonstrate coverage and remediation effectiveness
- Develop program efficacy metrics to support platform stability and improvements
- Review business and internal requests for new or vulnerability management reporting, design the solution, and develop metrics
- Work with stakeholders to identify risk-based vulnerability management metrics that align with the security program and security risk management
- Develop procedures to structure the metrics and reporting framework as part of a long-term strategy
- Produce scoping documents outlining the requirements for business requests
- Provide recommendations based on data analysis and findings related to vulnerability management processes
- Aggregate vulnerability data across technologies such as endpoints, servers, network equipment, and cloud and interpret and present risk.