Security Vulnerability Assessment Engineer

High AlphaIT & Cybersecurity 3-5 Years

Job Description

High Alpha is hiring key team members for a new B2B SaaS startup in Indianapolis. This position will be with High Alpha’s latest company, which is pre-public launch. You’ll work closely with the team while reporting directly to the Chief Technology Officer. If you’ve ever been interested in working at a company from scratch as a member of the initial team, this is it!

The Security Vulnerability Assessment Engineer will serve as the subject matter expert in the selection, development, deployment and interpretation of results from this company’s multi-faceted security vulnerability assessment platform. You will be responsible for finding and integrating existing industry-standard tools into the company’s platform, and also developing new security tools when none are available. This position will work closely with the development team to serve as the subject matter expert on integrated tools.

What You’ll Do:
You will be an integral part of a high-powered (and fun) team developing a market changing cyber risk management/cyber insurance platform.
You will be responsible for the research, integration and management of existing security tools into the company’s security assessment platform.
You will be responsible for the design and development of new vulnerability assessment tools to meet emerging needs
You will be responsible for the capture, storage and securing of vulnerability assessment data for further processing by our analytics and prediction platform
What We’re Looking For:
Deep level understanding of the vulnerability management space—as you will be the subject matter expert for this portion of our product. (external, internal, credentialed, non-credentialed, certificate, web-based, public cloud config , dark web)
Experience working with vulnerability management platforms and products, including the configuration and management of the tool as well as interpretation of the resulting data.
Experience automating interfaces with existing vulnerability assessment tools whether via API or simple automation.
Familiarity with cloud development and deployment methodologies.
Solid understanding of distributed systems and scalability challenges, multi-threading, concurrency, error handling, multi-tenancy concerns, and parallel processing technologies
What We Value:
We are obsessed with our customers’ success
We are transparent and honest with our customers, our business partners, and each other
We advocate for diversity in all its forms
We believe that laughter makes us more productive
We take care of ourselves and our families so that we can bring our very best to work every day

Posted On

October 1, 2020