Vulnerability Management Analyst
Listed on 2026-01-03
-
IT/Tech
Cybersecurity
Position
Vulnerability Management Analyst
LocationRemote
Job290
# of Openings1
About SalienseSaliense is a leading technology solutions provider specializing in Cybersecurity, Engineering, and Modernization. We deliver scalable, tangible solutions that empower federal, state, and local government agencies to address complex challenges and stay ahead in a rapidly evolving digital landscape. With a commitment to excellence, ethical practices, and a culture of growth and innovation, Saliense has been recognized on the Inc. 5000 list for six consecutive years, reflecting our sustained progress and impact.
WhySaliense
At Saliense, we are committed to fostering a culture of continuous learning and professional growth. Our employees are encouraged to take on challenging and meaningful work, with ample opportunities for career advancement. We offer competitive compensation and benefits, including:
- 20 Days PTO + 40 Hours of Paid Sick & Safe Time
- Health, Vision, Dental, and Life Insurance
- 401(k) with Tiered Match & 100% Vesting
- Parental Leave for Birthing and Non-Birthing Parents
- Professional Development Reimbursement Program
We believe in empowering our team members to achieve our professional goals while contributing to impactful projects that make a difference. Join us at Saliense and be part of a growing organization dedicated to innovation, collaboration, and excellence. to learn more.
Vulnerability Management Analyst Job OverviewThe Vulnerability Management Analyst is responsible for enhancing the organization’s cybersecurity vulnerability management program by analyzing scan results, validating findings, and providing remediation guidance. The position involves refining standardized scanning processes, leveraging cyber analytics to create dashboards and reports that highlight high-risk vulnerabilities and coordinating with stakeholders to remediate vulnerabilities. A detail-oriented, analytical professional who thrives in a collaborative environment and takes initiative to solve complex security challenges will excel in this role.
Responsibilities- Analyze raw scan results and deliver clear, actionable findings to the requesting party, including identification and validation of potential false positives and recommendations for effective remediation.
- Apply cyber analytics knowledge to develop dashboards, data views and reports to highlight high-risk vulnerabilities and priorities.
- Develop and present actionable recommendations to optimize current scanning processes, ensuring greater efficiency, consistency, and accuracy while maintaining full compliance with required scanning time frames.
- Assist in designing and implementing standardized processes for vulnerability scanning, including the development of Standard Operating Procedures (SOPs), workflows, and related guidance to ensure consistency, compliance, and efficiency across all scanning activities.
- Research and evaluate potential solutions for integrating vulnerability scan results into the enterprise Governance, Risk, and Compliance (GRC) system, enabling streamlined review, validation, and updates by assessors, system owners, and vulnerability management teams. This includes assessing integration capabilities, data mapping requirements, and automation opportunities to improve accuracy, efficiency, and compliance with organizational security policies.
- Hands-on experience with enterprise security tools, including Tenable, Tanium, Invicti, Splunk, Big Fix, Nessus, Active Directory, and Prisma Cloud, to support vulnerability management, threat detection, compliance monitoring, and system hardening across complex environments.
- Strong cyber data analytics knowledge and expertise in developing dashboards, data views and reports using Microsoft Excel pivot tables, charts, and graphs and other reporting tools.
- Experience designing, developing and implementing workflows to automate VM processes using Power BI or other workflow automation tools.
- Knowledge of the latest vulnerability trends, exploits, and cybersecurity advisories.
- Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy in a federal environment.
- Able to…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).