$130,000 - $212,500 Annual
Princeton, New Jersey
$130,000 - $212,500 Annual
Who We are Looking For
This role will be member of the Global Infrastructure Operations Continuous Service Improvement (CSI) team as part of 24*7*365 Production Management organization. An organization that delivers highly secure, reliable, efficient infrastructure technology operations services that are focused on the needs of all State Street business. Responsible for delivering continuous improvement across various infrastructure operations towers by supporting the ITIL framework to improve processes, which ultimately improve our business.
As an End User Administrator specializing in Vulnerability Patching, your primary responsibility will be to ensure the security and integrity of end-user devices within the organization by effectively managing and implementing vulnerability patches. You will play a crucial role in safeguarding sensitive information and preventing potential security breaches.
What you will be responsible for
The right person for this role will have a strong track record of program management experience, the demonstrated ability to deliver multiple high priority projects simultaneously, the ability to drive alignment across teams with competing priorities and be a strong advocate for risk management.
Job Description
- Coordinate and execute the deployment of security patches across various end-user devices, including desktops, laptops, and mobile devices, to address known vulnerabilities and mitigate security risks.
- Patch Management
- Conduct regular vulnerability assessments and scans to identify weaknesses and potential security threats in end-user systems, applications, and configurations.
- Vulnerability Assessment
- Analyze the impact and severity of identified vulnerabilities to prioritize patching efforts based on risk levels and potential business impact.
- Risk Analysis
- Collaborate with the IT team to test patches in a controlled environment before deployment to ensure compatibility and minimize disruptions to end-user productivity.
- Patch Testing
- Develop and maintain a comprehensive patch deployment schedule and plan to ensure timely and efficient patching while minimizing downtime and disruption to end-user operations.
- Deployment Planning
- Maintain accurate records of patching activities, including patch deployment status, system configurations, and vulnerability assessments, to support compliance requirements and audit processes.
- Documentation
- Provide support in responding to security incidents related to vulnerabilities, including investigation, containment, and remediation efforts, as necessary.
- Incident Response
- Conduct training sessions and awareness campaigns to educate end users on the importance of patching and best practices for maintaining device security.
- Training and Awareness
- Individual will play a direct role in vendor management, overseeing the scheduling and implementation of the patching activities across all platforms.
- Support and Drive remediation of cyber risks identified by Global Cyber Security, Corporate Audit, Technology Risk Management and Regulators.
- Participate in engineering and technical solutioning to strengthen controls and improve effectiveness of the Patching & Compliance Program.
- Participate in the continuous improvement of the existing and the development of new automation solutions to enhance effectiveness of the program.
- Ensure the Patching & Compliance Program satisfies all Internal & External Regulatory and Compliance standards
- Support Regulatory and Audit inquiries providing insight to the Patching & Compliance Program and detailed evidence when requested.
- Provide Information Technology risk management and compliance support to ensure effective identification, measurement, control and management of the relevant risks
- Identify and manage IT risk by maintaining effective internal controls and escalating as appropriate any deficiencies to management and/or applicable technology governance boards.
- Drive Continuous Service Improvement by looking at lesson learns and gap analysis and implement improvement plans to document, update and improve daily operation procedures
- Develop reports using data that is hosted in multiple sources/tools (e.g., spreadsheets, dashboards) and communicate clearly to leadership and other cyber security teams
- Engage with Application engineering leads and SRE/IT teams to coordinate vulnerability remediation from technical and policy compliance perspectives
- Track and monitor key milestones or after significant change in the environment to identify network, infrastructure, and configuration vulnerabilities
- Perform ad-hoc data remediation, clean-ups, and reporting using large complex data sets for high-priority security remediations
What we value
- Bachelors degree in Computer Science, Information Technology, or related field.
- Ability to effectively coordinate and communicate between technical teams and business stakeholders with varying technical proficiencies
- 10 years of production Support for End-User Computing
- Experience working with Web technologies, including JavaScript, Ajax, HTML, and CSS
- Experience with LDAP Integration and Web Service Integration such as API Web Services
- Proven experience in end-user administration, patch management, or cybersecurity roles.
- Strong understanding of vulnerability management principles, methodologies, and tools.
- Familiarity with patch management systems, such as SCCM, WSUS, or similar.
- Proficiency in conducting vulnerability assessments and interpreting scan results.
- Excellent analytical and problem-solving skills with attention to detail.
- Effective communication and interpersonal skills to collaborate with cross-functional teams and end users.
- Relevant certifications, such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH), are a plus.
Salary Range
The range quoted above applies to the role in the primary location specified. If the candidate would ultimately work outside of the primary location above, the applicable range could differ.