Infrastructure Vulnerability Management / Security Engineer at AgreeYa Solutions
Plano, Texas, USA -
Full Time


Start Date

Immediate

Expiry Date

04 Dec, 25

Salary

60.0

Posted On

04 Sep, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Macos, Python, Information Technology, Communication Skills, Guardium, Windows, Software, Health Insurance, Computer Science, Cpg, Scripting Languages, Orchestration, Information Security, Endpoint Security, It Security, Public Sector, Financial Services, Retail

Industry

Information Technology/IT

Description

Would you like to work for a software solutions company that has grown in triple digits in the last 5 years? If you answered Yes, then we need to talk….
We are looking for an Infrastructure Vulnerability Management / Security Engineer who be part of a close-knit, high performing team. We are committed to creating an environment where all employees are valued and respected. This position offers a very competitive compensation and benefits package

POSITION DESCRIPTION ::

We are seeking a dynamic, experienced Infrastructure Vulnerability Management Specialist, specializing in devices and databases to spearhead our vulnerability management program. This leadership role will drive proactive risk reduction, guide technical teams, and ensure our infrastructure remains robust, compliant, and resilient against evolving threats.

POSITION SUMMARY

  • The Infrastructure Vulnerability Management Specialist will be responsible for supporting a robust vulnerability management program focused primarily on end points and databases. As the subject matter expert, this individual will collaborate with IT, security, and compliance teams to identify, assess, prioritize, and remediate vulnerabilities across endpoints (including end users), servers, network appliances, and database systems. By blending technical acumen and strategic foresight, the successful candidate will play a pivotal role in safeguarding our assets and enabling secure business operations.

REQUIRED QUALIFICATIONS

  • Bachelor’s or Master’s degree in Information Security, Computer Science, Information Technology, or a related field.
  • Minimum 3-5 years of experience in IT security, with 3+ years dedicated to vulnerability management
  • In-depth knowledge of endpoint security, network security, and database security principles.
  • Experience with agent and credential management deployment methodologies
  • Hands-on experience with leading vulnerability scanning tools such as Tenable , SentinelOne, Guardium
  • Proficiency in database platforms (e.g., Oracle, SQL Server, MySQL, PostgreSQL, MongoDB) and device operating systems (Windows, Linux, macOS, iOS, Android, etc.).
  • Excellent problem-solving, project management, and communication skills.

PREFERRED SKILLS & EXPERIENCE

  • Expertise in automation and orchestration using scripting languages (Python, PowerShell, Bash, etc.).
  • Experience with ServiceNow Vulnerability Response module.
    About AgreeYa: AgreeYa is a global systems integrator delivering a competitive advantage for its customers through software, solutions, and services. Established in 1999, AgreeYa is headquartered in Folsom, California, with a global footprint and a team of more than 1,800+ professionals across offices. AgreeYa works with 550+ organizations ranging from Fortune 100 firms to small and large businesses across industries such as Telecom, Banking, Financial Services & Insurance, Healthcare, Utility & Energy, Technology, Public Sector, Pharma & Biotech, Retail, CPG, and others. Please visit us at www.agreeya.com for more information.
    Job Type: Contract
    Pay: $50.00 - $60.00 per hour

Benefits:

  • Dental insurance
  • Health insurance
  • Vision insurance

Work Location: In perso

Responsibilities
  • Program Leadership: Develop and lead the enterprise-wide vulnerability management strategy for end-user end point vulnerability detection.
  • Assessment & Identification: Oversee regular scans and manual assessments to identify vulnerabilities in end points and databases.
  • Prioritization: Use risk-based methodologies to prioritize vulnerabilities based on business impact, threat intelligence, and exploitability.
  • Tooling & Automation: Evaluate, deploy, and optimize cutting-edge vulnerability scanning and management tools for devices and databases; automate workflows to streamline the vulnerability lifecycle.
  • Continuous Improvement: Stay abreast of emerging threats, vulnerability research, and technology trends to continuously enhance the program’s effectiveness.
Loading...