Vulnerability Response

Vulnerability management is the regular process of identifying, assessing, and remediating cybersecurity vulnerabilities across all systems including cloud networks, servers, network equipment and databases.

The job description of Vulnerability Response can include the following:


  • Identify critical flaws in applications and systems that cyber actors could exploit
  • Conduct vulnerability assessments of relevant technology (e.g., computing environment, network and supporting infrastructure, and applications).
  • Prepare and present comprehensive vulnerability assessments.
  • Conduct network security audits and scanning.
  • Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense operations.
  • Prepare audit reports that identify technical and procedural findings and make recommendations on corrective strategies and solutions.
  • Conduct and/or support authorized penetration testing on organization networks and systems.
  • Support the identification and impact classification for new vulnerabilities identified in the environment.

 Selection Criteria:

  • Degree or diploma in Computer Science, Information Technology, or a related field.
  • Experience in vulnerability management, penetration testing, and security risk assessment.
  • Familiarity with vulnerability assessment tools.
  • Experience and familiarity with network security and host security technologies.
  • Strong technical skills.
  • Superior problem-solving and analytical skills.
  • Organized and attentive to detail.