×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Cybersecurity Analyst - Vulnerability Management

Job in Tempe, Maricopa County, Arizona, 85285, USA
Listing for: RunBuggy OMI, Inc.
Full Time position
Listed on 2026-01-01
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below

Description

About Us:

Run Buggy is the most technically advanced automotive logistics platform on the market. Period.

Backed by Porsche Ventures and Hearst Ventures, Run Buggy is transforming the way cars move. Our cutting-edge technology is trusted by some of the largest OEMs, captive finance companies, and automotive lenders in the world to streamline vehicle transportation at scale.

Run Buggy’s end-to-end platform connects car shippers and haulers in real time - eliminating the friction of traditional load boards and costly custom software. For shippers, Run Buggy integrates directly into existing management systems, reducing transportation costs and accelerating delivery timelines. For transporters, we offer a smarter, more profitable way to find, accept, and manage loads - all from a single app.

Since launching in 2019, Run Buggy has grown to over 150 team members, facilitated the movement of hundreds of thousands of vehicles, and attracted tens of thousands of transporters across the U.S.

We’re not just building a better logistics platform - we’re redefining the future of automotive transportation.

About the Role:

The Cybersecurity Analyst - Vulnerability Management plays a critical role in safeguarding our products and supporting infrastructure. This position is responsible for identifying and mitigating emerging threats, managing product-related security issues, and leading the vulnerability management program across the product lifecycle.

Candidates must be authorized to work in the US for any employer and must be within a commutable distance of Tempe, AZ. Please do not apply if you do not meet these requirements.

Candidates who include a cover letter explaining how their experience aligns with the position will receive priority in the review and interview process.

Requirements What You Will Be Doing::
  • Responsible primarily for day-to-day product vulnerability management services and supporting infrastructure.
  • Ensure product vulnerabilities are identified, prioritized, and remediated, particularly by reducing the backlog of existing product vulnerabilities.
  • Ensure that releases and product changes are reviewed and approved by the Security Team.
  • Collaborate with engineering teams to understand product vulnerability management needs and assist with remediation and mitigation strategies.
  • Build relationships with various teams and technology owners to decrease the likelihood of friction or roadblocks.
  • Schedule and assist with remediation efforts from external and internal penetration tests and assessments.
  • Perform analysis of scan results, assign risk ratings for product vulnerabilities, and help prioritize remediation efforts.
  • Help establish and operationalize key performance indicators, reporting, and metrics to track the maturity of the product vulnerability program.
  • Oversee and help execute manual code review of key product components for security improvements.
  • Help drive the security and privacy product requirements process across Run Buggy’s product lines, implementing security early in the product roadmap.
  • Execute on an agreed-upon risk prioritization framework in conjunction with engineering, product, development, operations, and the Sr. Director of Security and Audit who outlines the highest risk items for action to improve Run Buggy’s product security.
  • Collaborate with product and sales engineering teams for hardening applications, APIs, and micro services with security built into the services.
  • Help influence new deployment models, including containers, cloud platforms, SaaS, etc., with security built into the platform.
  • Help drive identification of software security findings throughout the lifecycle and the reduction of risk, working with relevant stakeholders.
  • Maintain current knowledge of the Run Buggy threat landscape, including attacker tactics, techniques, and procedures.
  • Other duties as assigned.
What You Bring to the Team by Way of

Skills and Experience:
  • Demonstrated understanding of cybersecurity threats and vulnerability management and related IT domains.
  • 3+ years’ relevant experience as a Vulnerability Analyst required.
  • A degree in Computer Science, IT, Systems Engineering, or a…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary