Vacancy expired!
- “Client” is using Tenable (Enterprise).
- This person must have Tenable Security Center experience, as well as a background in vulnerability assessment/analysis from cybersecurity perspective - - i.e., hardening systems, analyzing vulnerabilities, pen testing and using software involved with that.
- This person should have deep understanding of TCP/IP.
- Wireshark or similar product.
- This person will be responsible for administering Enterprise Tenable – not necessarily making changes to Tenable but they should be able to manage Enterprise scanning schedule (Example: A whole bunch of scans set up, for example 30-40 scans set up to scan 100,000 devices… being able to manage schedule of scans and configuration of scans, as well as being able to edit and monitor scans).
- This person must have experience logging into Linux (if they have advanced experience with Tenable, they will know Linux as Tenable backend is Linux SSH).
- Experience using GUI in Tenable, as well as knowing how to log in and administer through command line.
- Tenable integrates with other products at “Client” - - tripwire for example… a bunch of python scripts that connect to Tenable API import data into Tenable and export data from Tenable.
- Interacting with Tenable API.
- Windows & Linux Systems Administration - - should be able to look at vulnerabilities and how to fix or remediate vulnerabilities.
- Experience administering Tenable (at least 6 months experience – Senior/Expert level)
- Windows/Linux Systems Administration (at least some experience as a Sys Admin)
- Some Networking experience as well – DNS relationships with IP addresses
- Wireshark or similar tool
- Troubleshoot/solution Tenable black list – Assets/Subnets excluded from past scans
- This is to support the ongoing deployment and maturity of the product.
- Basic Scripting experience required for daily task or product automation – (Korn Shell or Bash Shell)
- Willingness to learn
Vacancy expired!