Payrate : $46.00 - $52.00 / hr. Summary : We are seeking a skilled Cyber Security Engineer (contract) to fill a key role within General Imaging (GI) Ultrasound, with a focus on vulnerability management and incident response capability. In this role you will work in a team to identify risks and communicate and track product vulnerabilities. ResponsibilitiesInstalled Base and Commercial Support Complete DoD monthly security scans Complete remediation actions and prepare quarterly POAM review Ready solutions for open issue closure per schedule Support commercial and installed base inquiries Vulnerability Management Vulnerability analysis and issue mitigation Maintain cyber Bills of Material and conduct proactive vulnerability monitoring and assessment on cyber components Scope and participate in hardware and software penetration tests, vulnerability identification and vulnerability risk assessment Engage in incident response methods, lead incident response processes related to product cyber Create and track meaningful metrics around product cyber risk and compensating controls Client and mitigate vulnerabilities in sensitive Critical Infrastructure / Key Resource Domains (CI / KR) Develop and design innovative cyber security solutions for unique and complex technologies Assess and investigate specific threats in terms of severity and impact Create detailed reports on vulnerabilities, bugs, and design flaws Create vulnerability and incident trend analysis to improve product design Automate cyber trending and change detection Design an early detector, of changes in security status with the ability to compare SBOM, SCAP and NESSUS results against a baseline Product security Engage and administer End of Life processes for digital products Consult architects on security requirements and utilize best practices to meet requirements. Engage in application and domain-specific threat modeling and attack surface analysis / reduction Prepare reports at appropriate levels of confidentiality for stakeholders to view Qualifications : Bachelor’s degree in computer science or “STEM” Majors (Science, Technology, Engineering and Math) with minimum of 6 years of professional experience including Cyber Security Certification in the Privacy, Security & Regulatory domain or related certification Familiarity with identifying, analyzing, and ethically exploiting the various classes of vulnerabilities that affect executable code Strong knowledge of TCP / IP networking. Ability to use Wireshark to capture and analyze network traffic Hands-on experience working with Windows and Linux based systems Programming skills in one or more languages (we develop using Python, C, C++, CUDA, and others) Business Acumen : Able to translate vulnerability information into business risks relevant to our customers Good understanding of workflow in the healthcare industry Knowledge of ultrasound or demonstrated experience with development of medical device software Experience with cyber security framework (NIST 800-53, ISO 27001, IEC 62443, etc.) implementation and governance Experience with secure coding principles; code signing and secure boot Experience with penetration testing and ethical hacking Demonstrated ability to work with blended Agile teams, including global teams Excellent communication, facilitation, and documentation skills Pay Transparency : The typical base pay for this role across the U.S. is : $46.00 - $52.00 / hr. Final offer amounts, within the base pay set forth above, are determined by factors including your relevant skills, education and experience and the benefits package you select. Full-time employees are eligible to select from different benefits packages. Packages may include medical, dental, and vision benefits, 10 paid days off, 401(k) plan participation, commuter benefits and life and disability insurance. Consent to Communication and Use of AI Technology : By submitting your application for this position and providing your email address(es) and / or phone number(s), you consent to receive text (SMS), email, and / or voice communication whether automated (including auto telephone dialing systems or automatic text messaging systems), pre-recorded, AI-assisted, or individually initiated from Aditi Consulting, our agents, representatives, or affiliates at the phone number and / or email address you have provided. These communications may include information about potential opportunities and information. Message and data rates may apply. Message frequency may vary. You represent and warrant that the email address(es) and / or telephone number(s) you provided to us belong to you and that you are permitted to receive calls, text (SMS) messages, and / or emails at these contacts. You also acknowledge and agree to Aditi Consulting LLC’s use of AI technology during the sourcing process, including calls from an AI Voice Recruiter. AI is used solely to gather data and does not replace human-based decision-making in employment decisions. Calls may be recorded. Consent is not a condition of purchasing any property, goods, or services. You may revoke your consent at any time by replying “STOP” to messages or by contacting privacy@aditiconsulting.com. For information about our collection, use, and disclosure of applicant's personal information as well as applicants' rights over their personal information, please see our Privacy Policy
Cyber Security Engineer • Milwaukee, WI, US