IT Vendor Management Analyst is responsible for the day-to-day administration of technology vendor relationships and serves as the organization's point of contact to ensure smooth performance of operations. Assists vendor selection by reviewing and evaluating requests for proposals and contracts. Being an IT Vendor Management Analyst monitors compliance with service level agreements to ensure performance/quality metrics, responsibilities, and expectations are met. Develops dashboards, reports, and presentations to track vendor performance. Additionally, IT Vendor Management Analyst proactively identifies areas where performance is at risk and collaborates with vendors to establish service quality mitigation strategies. Appropriately escalates vendor product and service issues. Typically requires a bachelor's degree. Typically reports to a manager. The IT Vendor Management Analyst work is closely managed. Works on projects/matters of limited complexity in a support role. To be an IT Vendor Management Analyst typically requires 0-2 years of related experience. (Copyright 2024 Salary.com)
Job Requirement: Application Penetration Analyst
Position: Security Engineer
Experience: Application Penetration Testing
Responsibilities & Experience:
- Minimum of 5 years of experience as an Web Application Penetration Analyst with expertise in Developing and execute penetration testing plans and methodologies to assess the security posture of applications
- Extensive experience in conducting penetration testing on various third-party applications and software
- Previous experience working with state clients and understanding their specific security requirements and compliance standards desired
- Collaborate with development, security teams and external vendors to implement security best practices and improve the overall security posture of applications
- Generate comprehensive reports detailing findings, recommendations, and remediation steps for identified vulnerabilities
- Strong knowledge of common security vulnerabilities, such as OWASP Top 10, and experience in identifying and remedying these vulnerabilities in applications.
- Stay up-to-date on the latest security threats, vulnerabilities, and industry trends to enhance penetration testing methodologies
- Bachelor s degree in Computer Science, Information Technology, or related field
- Relevant certifications such as GPEN,OSCP, CISSP, or CEH are highly preferred