What You'll Do - Support and maintain enterprise vulnerability management tools (Tenable, Burp, Microsoft Defender), ensuring timely updates and patches - Run regular and on-demand scans across operating systems, databases, web applications, and containers, then work with technical teams (for example, SRE and client administrators) to create tickets for remediation - Track and document vendor dependencies, operational requirements, and open vulnerabilities on a monthly basis, producing clear reports and updates for clients - Maintain, and update SIEM solutions (e.g., Splunk, Sentinel, ELK, LogRhythm, Sumo Logic) to enhance visibility and proactively mitigate cyber threats. - Build and respond to critical security alerts as part of our incident monitoring process. What You'll Bring - 1-2 years' experience in 24x7x365 production security operations - 1-2 years' experience participating in incident response and analysis activities - 1-2 years' experience with vulnerability management, compliance monitoring, or related security operations roles - Hands-on expertise with operating system, database, network, container, web application, and API vulnerability management - 1+ years of hands-on technical experience supporting cloud operations and automation in Azure, AWS, and/or GCP - Experience in Information Security with a focus on incident response and security engineering - Exposure to threat identification using SIEM tools, log sources, and forensics tools and techniques - Experience with ITSM solutions such as Jira and ServiceNow - Experience or familiarity with Tenable.sc, Nessus Pro, or Nexpose - Understanding of regular expression and query languages - Experience analyzing events or incidents to triage the issue - Fundamental skills and knowledge of Azure, AWS, or GCP - Knowledge of vulnerability scanning technologies and methods, including scoring systems (CVSS, CMSS) - Ability to work efficiently with technical teams to investigate, prioritize, and remediate vulnerabilities - Familiarity with defining baseline configuration standards (for example, CIS Benchmarks) and reporting on compliance posture - Exposure to one SIEM platform (e.g., Splunk, Sentinel, ELK, LogRhythm, Sumo Logic) and enterprise antivirus (AV) solutions (e.g., Trend Micro, CrowdStrike, Microsoft Defender). - Experience working in large scale enterprise environments - Effective communication, organizational, and documentation skills, with an emphasis on providing timely updates and clear reports to clients Bonus Points - Professional services background: Prior experience supporting external clients from within a consulting or professional services organization. - Automation capabilities: Experience automating workflows in GitLab or GitHub with Terraform and Ansible. - Configuration baseline standards: Familiarity with CIS Benchmarks, DISA STIG, and other relevant guidelines. - Compliance frameworks: Understanding of FedRAMP, FISMA, HIPAA, HITRUST, PCI, and similar regulatory standards. - Security-focused cloud certifications for Azure, AWS, or GCP - Security+
Job Type
Remote role
Skills required
Azure, GitHub
Location
United States
Salary
No salary information was found.
Date Posted
July 10, 2025
Coalfire is seeking a Security Operations Administrator to enhance vulnerability management and support SIEM monitoring in cloud environments. This role involves collaborating with technical teams to ensure compliance and security across various platforms.