Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Lead Cloud Infrastructure Vulnerability Analyst image - Rise Careers
Job details

Lead Cloud Infrastructure Vulnerability Analyst

Role: Lead Cloud Infrastructure Vulnerability AnalystSynonymous Business Title: Sr Security and Compliance Program ManagerLocation: Dallas, TX or Scottsdale, AZ (will work remotely)Overview• Blue Yonder is a Leading AI-driven Global Supply Chain Solutions Software Product Company and one of Glassdoor’s “Best Places to Work” .• Seeking an Lead Cloud Infrastructure Vulnerability Analyst who would be responsible for leading Cloud Security Posture Management (CSPM), identifying security vulnerabilities including misconfigurations across cloud infrastructures, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS).• This candidate would also be responsible for Cloud Workload Protection (CWP), to provide continuous discovery and monitoring of vulnerabilities in the workloads deployed in the cloud infrastructure.• Candidate will be directly responsible for vulnerability management and threat management of the overall infrastructure and information assets.Scope• Core responsibilities to include assessing and promoting remediation for all the assets in the Infrastructure as a Service (IaaS) and Software as a Service (SaaS).• Candidate will be a key member of the centralized information security team.What You’ll Do• Discover and continuously monitor for vulnerabilities in the public cloud infrastructure, cloud workloads including dockers, Kubernetes, and containers, etc.• Create golden images for virtual machines, dockers and containers to be spun up for the business.• Identify gaps in Identity and Management (IAM) in Public Cloud.• Perform vulnerability scans and report findings for On-prem and Cloud networks.• Publish the vulnerability status reports to senior management and track remediation.• Define and participate in implementation of On-prem and Cloud architecture and security controls.• Proactive identification of threats and risk remediation.• Discover the assets in the cloud infrastructure to identify and continuously monitoring for security vulnerabilities and misconfigurations.• Maintain security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs.• Upgrade security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements.• Participate in and assist with incident response team, as appropriate.• Generate metrics for the Management as needed.• Prepare system security reports by collecting, analyzing, and summarizing data and trends.Required QualificationsWhat we are looking for:• 8 to 12+ years of proven experience in Information Security and/or Vulnerability Management.• 5+ years of public cloud security infrastructure experience within Azure, AWS or GCP.• Must have experience with at least one of the following CSPM (Cloud Security Management) tools; Prisma Cloud (Palo Alto Networks), Wiz, AWS Security Hub, Microsoft Defender for Cloud (formerly Azure Security Center), Check Point Cloud Guard, Lacework OR Orca Security.• Strong understanding of Threat Sources/Feeds like CISA, Threat Intelligence, and the latest Vulnerabilities like Log4J, Spring4shell, etc.• Bachelor’s degree in Information Security, MIS or Computer Science.Preferred Qualifications• Certifications such as CCSK, CCSP, GCSA, Microsoft Certified Azure Security Engineer Associate, CISSP or equivalent.• Thorough understanding of Identity and Access Management best practices in Public cloud.• Deep and diverse experience architecting and implementing network security designs. Expert in network security, system security and endpoint security.• Through understanding of security vulnerabilities and misconfigurations in the cloud infrastructure.• Thorough understanding of native cloud solutions like dockers, containers, Kubernetes, VDIs, cloud storage, cloud infrastructure, etc.• Familiarity with security frameworks and regulatory requirements such as NIST, ISO 27001/2, and SSAE-18.• Proven experience with products dealing with vulnerability management services which include Qualys, Nessus, Nexpose, etc.• Practical experience with the development, implementation, and management of security related technologies (i.e., SIEM, WAF, AV, Firewalls, Internet-facing services).• Excellent customer service including strong written and oral communication skills.• Knowledge of security network devices (firewalls, switches, SIEM, Antivirus, cryptography, etc.) and other security networking hardware/software tools.• Demonstrated understanding of information security concepts, standards, practices, including but not limited to firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management and event monitoring/reporting.• Results focused and attention to detail.The salary range for this position is $137,127 - $172,873.The salary range information provided, reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual salary will be commensurate with skills, experience, certifications or licenses and other relevant factors. In addition, this role will be eligible to participate in either the annual performance bonus or commission program, determined by the nature of the position.BenefitsAt Blue Yonder, we care about the wellbeing of our employees and those most important to them. This is reflected in our robust benefits package and options that includes:• Comprehensive Medical, Dental and Vision• 401K with Matching• Flexible Time Off• Corporate Fitness Program• A variety of voluntary benefits such as; Legal Plans, Accident and Hospital Indemnity, Pet Insurance and much moreAt Blue Yonder, we are committed to a workplace that genuinely fosters inclusion and belonging in which everyone can share their unique voices and talents in a safe space. We continue to be guided by our core values and are proud of our diverse culture as an equal opportunity employer. We understand that your career search may look different than others, and embrace the professional, personal, educational, and volunteer opportunities through which people gain experience.Our ValuesIf you want to know the heart of a company, take a look at their values. Ours unite us. They are what drive our success – and the success of our customers. Does your heart beat like ours? Find out here: Core ValuesDiversity, Inclusion, Value & Equity (DIVE) is our strategy for fostering an inclusive environment we can be proud of. Check out Blue Yonder's inaugural Diversity Report which outlines our commitment to change, and our video celebrating the differences in all of us in the words of some of our associates from around the world.All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

Average salary estimate

Estimate provided by employer
$176000 / ANNUAL (est.)
min
max
$148K
$204K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Lead Cloud Infrastructure Vulnerability Analyst, Blue Yonder

Are you ready to take the lead as a Lead Cloud Infrastructure Vulnerability Analyst with Blue Yonder in sunny Dallas, TX? As a globally recognized AI-driven supply chain solutions software provider, we’re all about innovation and driving success. In this dynamic role, you'll be at the forefront of Cloud Security Posture Management (CSPM) and Cloud Workload Protection (CWP), passionately identifying security vulnerabilities and misconfigurations across various cloud infrastructures including IaaS, SaaS, and PaaS. Your expertise will help us continuously monitor and safeguard our cloud workloads, including dockers and Kubernetes environments. You’ll work alongside a talented team, conducting vulnerability assessments and championing remediation efforts that are crucial for protecting our information assets. With a strong emphasis on proactive threat identification, you’ll play a vital role in maintaining our security standards and compliance. If you have a robust background in cloud security, are up to date with the latest threat intelligence, and possess exceptional skills in vulnerability management, this is the perfect opportunity to innovate and enhance cloud security at Blue Yonder. Come join us and contribute to our mission of delivering visionary solutions while enjoying a work environment that values diversity, inclusion, and professional growth.

Frequently Asked Questions (FAQs) for Lead Cloud Infrastructure Vulnerability Analyst Role at Blue Yonder
What are the main responsibilities of a Lead Cloud Infrastructure Vulnerability Analyst at Blue Yonder?

As a Lead Cloud Infrastructure Vulnerability Analyst at Blue Yonder, your main responsibilities include leading Cloud Security Posture Management (CSPM), continuously monitoring for vulnerabilities across cloud environments, and conducting vulnerability assessments on cloud workloads. You will also be responsible for identifying gaps in Identity and Access Management (IAM) and participating in the implementation of security controls.

Join Rise to see the full answer
What qualifications do I need to become a Lead Cloud Infrastructure Vulnerability Analyst at Blue Yonder?

To qualify for the Lead Cloud Infrastructure Vulnerability Analyst position at Blue Yonder, candidates should have 8 to 12 years of experience in Information Security or Vulnerability Management, with at least 5 years of experience specifically in public cloud security environments like Azure, AWS, or GCP. A degree in Information Security, Computer Science, or a related field is required, along with expertise in using CSPM tools.

Join Rise to see the full answer
What skills are required for the Lead Cloud Infrastructure Vulnerability Analyst role at Blue Yonder?

Required skills for the Lead Cloud Infrastructure Vulnerability Analyst role include a deep understanding of threat sources and vulnerability management, proficiency with CSPM tools such as Prisma Cloud or AWS Security Hub, and familiarity with cloud-native solutions like dockers and Kubernetes. Additionally, excellent communication skills and a keen eye for detail are essential for tracking vulnerabilities and compliance.

Join Rise to see the full answer
What is the salary range for the Lead Cloud Infrastructure Vulnerability Analyst position at Blue Yonder?

The salary range for the Lead Cloud Infrastructure Vulnerability Analyst position at Blue Yonder is between $137,127 and $172,873. The exact salary will depend on an individual's experience, skills, certifications, and other relevant factors. This role is also eligible for an annual performance bonus or commission based on the nature of the position.

Join Rise to see the full answer
What benefits can I expect as a Lead Cloud Infrastructure Vulnerability Analyst at Blue Yonder?

At Blue Yonder, employees can expect a robust benefits package that includes comprehensive medical, dental, and vision coverage, a 401K plan with matching contributions, flexible time off, and a corporate fitness program. Additionally, there are various voluntary benefits such as legal plans and pet insurance to enhance employee well-being.

Join Rise to see the full answer
Common Interview Questions for Lead Cloud Infrastructure Vulnerability Analyst
Can you explain your experience with Cloud Security Posture Management tools?

When discussing your experience with Cloud Security Posture Management tools, focus on specific tools you have used, such as Prisma Cloud or AWS Security Hub. Highlight how you've utilized these tools to identify vulnerabilities and implement remediation strategies in previous roles.

Join Rise to see the full answer
How do you stay updated on the latest cloud security threats?

Explain that you stay updated on the latest cloud security threats by following industry news, participating in cybersecurity forums, and utilizing threat intelligence feeds from sources like CISA. Mention any certifications or training programs you pursue to further your knowledge.

Join Rise to see the full answer
Describe a time when you identified a significant vulnerability in a cloud infrastructure.

Use the STAR method (Situation, Task, Action, Result) to describe a specific instance where you discovered a vulnerability. Emphasize how you communicated the findings and the steps you took to address and remediate the issue.

Join Rise to see the full answer
What strategies do you use for effective vulnerability management?

Discuss the systematic approach you employ for vulnerability management, such as conducting regular vulnerability scans, prioritizing vulnerabilities based on risk, and collaborating with teams for timely remediation. Highlight any frameworks you follow, like NIST or ISO standards.

Join Rise to see the full answer
How do you approach securing containers and orchestration platforms?

Talk about your methodology for securing containers, including implementing best practices during image creation, using security scanning tools, and configuring network policies in orchestration platforms like Kubernetes. Mention any experience with monitoring and incident response for these technologies.

Join Rise to see the full answer
Can you explain the importance of Identity and Access Management in cloud security?

Emphasize that Identity and Access Management (IAM) is critical for ensuring that only authorized users gain access to sensitive resources in the cloud, thereby minimizing the risk of data breaches. Discuss your experience in assessing IAM configurations and implementing best practices.

Join Rise to see the full answer
What do you consider to be the most significant security challenges for public cloud environments?

Mention challenges like misconfigurations, inadequate identity management, and the dynamic nature of cloud services that can lead to security oversights. Discuss how you would address these challenges through proactive monitoring and security best practices.

Join Rise to see the full answer
How do you report and communicate vulnerability findings to senior management?

Explain your process for compiling vulnerability reports, including the relevant metrics and trends you present to senior management. Highlight your communication skills and how you tailor your findings to the audience to ensure understanding and prompt action.

Join Rise to see the full answer
Tell me about a time you worked with a team to improve security in cloud infrastructure.

Illustrate a collaborative effort you participated in, detailing the team dynamics, your role, and the specific improvements made to the cloud infrastructure's security posture. Focus on the outcome and any lessons learned.

Join Rise to see the full answer
What is your approach for incident response in cloud environments?

Describe your incident response process, including how you detect, respond to, and recover from incidents in cloud environments. Cite examples of tools you use and any frameworks you employ to ensure a structured response.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Reltio Remote Raleigh-Cary, NC, Austin TX, Dallas, TX, Tampa Bay, FL, Boston, MA
Posted 5 days ago
Inclusive & Diverse
Customer-Centric
Feedback Forward
Collaboration over Competition

Our mission is to empower every person and organization on the planet to fulfill their potential with a vision to reduce the waste, energy and costs required to power global commerce, accelerating economic prosperity and global sustainability. Blu...

18 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, hybrid
DATE POSTED
December 14, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!