Job Description
THE OPPORTUNITY The Endpoint Services Team is looking for a hard-working, self-motivated individual to work closely with all departments in Dillard's IT as well as business users and management to drive the implementation of vulnerability management strategies. To be successful in this role, you must be an excellent communicator and very organized. We are looking for someone who can lead by example and inspire their fellow co-workers. The Endpoint Systems Vulnerability Specialist is responsible for significantly minimizing the number of security vulnerabilities.
THE TEAM The Endpoint Services Team is responsible for managing the research, implementation, and remediation of security for all endpoints. This includes securing Windows, Android, and macOS systems, as well as printers and third-party software. The team works with various internal teams and users to ensure secure and efficient endpoint operations. For those driven by puzzles and a passion for security, this team offers a uniquely rewarding experience. We excel at fixing the issues no one else sees, but everyone depends on. We guarantee that no two days are the same, yet each provides an opportunity to hone your skills on a range of novel and critical challenges.
WHAT YOU WILL DO - Remediate vulnerabilities through automated processes and document these processes
- Represent the Endpoint Services Team in vulnerability meetings
- Identify, familiarize yourself with, and prioritize outstanding vulnerabilities
THE MUST-HAVES - Powershell Scripting (must understand loops and validation checks)
- Windows Registry
- Windows Active Directory
- Strong understanding of Microsoft OS Endpoints
THE NICE-TO-HAVES - MECM(SCCM) experience
- Vulnerability Management Software (Tenable)
- Log Aggregation Software (Splunk, Axonius, Windows Event Viewer)
- Windows Group Policy
WITHIN 30 DAYS, YOU'LL - Learn how to build a Dillard's computer (starting with your own)
- Gain an understanding of the tools available to you and how to access them
- Attend a vulnerability meeting with our Information Security team
- Work with different team members to observe their responsibilities, understand team functionality, and learn business processes
- Begin training with a Microsoft Endpoint Configuration online course
WITHIN 60 DAYS, YOU'LL - Provide input during a Vulnerability Meeting
- Understand how to use tools Tenable and Axonious
- Use that understanding to identify a vulnerability for remediation
- Develop a process for remediation surrounding that vulnerability
- Simulate and test that remediation to determine user impact
WITHIN 90 DAYS, YOU'LL - Successfully complete your first vulnerability remediation with team assistance
- Document and have a full understanding of your proven remediation process
- Represent the Endpoint Services team in a Vulnerability Meeting
- Complete your training on the Microsoft Endpoint Configuration online course
- Identify, familiarize yourself with, and prioritize all outstanding vulnerabilities
- Develop continual training practices in remediation (i.e., Group Policy)
No immigration sponsorship (ex. H-1B, TN, STEM OPT) is available for this position
Job Tags
H1b,