Vulnerability Scanning Consultant

Posted 2 days ago
Main Location
Round Rock, TX, United States
Open jobs

Vulnerability Scanning Consultant

Round TX

The Dell Security & Resiliency organization manages the security risk across all aspects of Dell’s business. We are currently experiencing incredible growth in order to meet the security needs of the world’s largest technology company. With team members located in over 15 countries, you will have an excellent opportunity to influence the security culture at Dell and further develop your career.

Dell is a worldwide provider of information technology services and business solutions to a broad range of clients. We seek women and men who share our values, thrive in a team environment, and recognize the importance of accountability; people who strive to exceed expectations to ensure our Clients' success.

We are currently seeking a Vulnerability Scanning Consultant to join our Cybersecurity Vulnerability Scanning, Tools, and Automation Team, as part of the Cybersecurity, Analysis and Operations organization. The ideal candidate will have experience supporting & managing vulnerability management activities in large enterprise environments. In collaboration with the corporate Security and Resiliency Organization (SRO), Cyber Assurance and Vulnerability Management Team, the Vulnerability Scanning Consultant will work with Cybersecurity, IT Infrastructure and application teams to drive expansion and maturity of vulnerability scanning capabilities across all Dell networks and environments.

Key Responsibilities

  • Plan and execute vulnerability and compliance scans across the IT infrastructure and product environments
  • Ensure an active assessment capability across all networks and infrastructure together with IT and engineering teams to improve the capability and quality of scanning activities where necessary
  • Develops simple creative smart solutions to complex problems.
  • Collaborate with other members of the team on daily issues, diagnose and resolve scanner software problems, and restore normal operations
  • Build and maintain robust auditable documentation of standards, processes, procedures, and technical architectures and solutions
  • Troubleshooting of false positives and verification of vulnerability fixes.
  • Thorough understanding and management of business needs and expectations.
  • Adapts and evolves vulnerability scanning processes and procedures based on internal customer or business partner feedback.
  • Develops and implements automated and continuous scanning techniques to better support IT and application teams
  • Drive vulnerability scanning compliance and audit requests
  • Exhibits good understanding of vulnerability validation, re-production, and remedy advice and vulnerability research skills.
  • Contributes to the vulnerability scanning and tools program through quality deliverables, presentations, metrics/KPIs, and contribution to future strategy planning and maturity based on industry evolution and internal IT and application teams’ requirements
  • Demonstrates ability to strike a balance between strategic and tactical activities required to run the vulnerability management scanning efforts.
  • Participates in the creation, review and maintenance of current and proposed processes and procedures and related documentation within vulnerability scanning and tools team.
  • Mentor junior team members in vulnerability scanning and analysis
  • Cultivates the practice of staying abreast on latest trends and developments in vulnerability scanning tools and solutions, threat intelligence and remediation activities followed across industry

Functional/technical requirements:

  • A degree in Information Technology, Information Security or related major
  • 10+ years of direct experience in the field of cybersecurity.
  • Technical experience with any enterprise vulnerability scanning tool (Nexpose InsightVM, Tenable Nessus, Qualys, Twistlock)
  • Experience network and vulnerability scanning within IaaS, PaaS, and cloud environments (Azure, AWS, etc.)
  • Experience operationalizing container security
  • Experience supporting automated dynamic web application security assessments
  • Experience with programming and scripting languages – Python, PowerShell, etc.
  • Ability to understand and consult on CIS and DISA STIG benchmarks
  • Understanding and knowledge of OWASP tools and methodologies and security attack vectors.
  • Good technical aptitude, problem solving and ability to quickly learn and master new topics and domains.
  • Candidates must be able to work independently and demonstrate exceptional organizational and time management skills
  • Ability to collaborate as the technical lead in virtual teams
  • Ability to work comfortably and successfully in a fast-paced environment with frequent changes in priorities and ability to influence others or manage indirectly.
  • Understands what escalations are, and how to deal with them.
  • Excellent problem-solving skills with the ability to diagnose and troubleshoot technical issues.
  • Collaborative / team player, self-driven independent and customer-oriented
  • Excellent English written and communication skills
  • CISSP or similar certification advantageous.


We offer highly competitive salaries, bonus programs, world-class benefits, and unparalleled growth and development opportunities — all to create a compelling and rewarding work environment.

Dell is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. All employment decisions at Dell are based on business needs, job requirements and individual qualifications, without regard to race, color, religion or belief, national, social or ethnic origin, sex (including pregnancy), age, physical, mental or sensory disability, HIV status, sexual orientation, gender identity and/or expression, marital, civil union or domestic partnership status, past or present military service, family medical history or genetic information, family or parental status, or any other status protected by the laws or regulations in the locations where we operate. Dell will not tolerate discrimination or harassment based on any of these characteristics.

"LI Priority"

Help us maintain the quality of jobs posted on PowerToFly. Let us know if this job is closed.
We're a community of women leveraging our connections into top companies to help underrepresented women get the roles they've always deserved. Simultaneously, we work to build truly inclusive hiring processes and environments where women can thrive and not just survive.
Are you hiring? Join our platform for diversifiying your team
Vulnerability Scanning Consultant
Dell Technologies