RT

Request Technology

1 open position available

1 location
1 employment type
Actively hiring
Full-time

Latest Positions

Showing 1 most recent job
RT

Manager Vulnerability / Pen Testing / Red Teaming /AI/ML

Request TechnologyAnywhereFull-time
View Job
Compensation$225K - 250K a year

Manage and motivate a team of 13 in enterprise-wide vulnerability management, drive tooling roadmap, advance mature security programs, and implement AI/ML automation. | 8+ years experience in vulnerability management with supervisory experience, relevant security certifications, expertise in risk-based vulnerability management, vulnerability scoring, scanning tools, and AI/ML automation. | NO SPONSORSHIP - NO OPT Manager Vulnerability / Pen Testing / Red Teaming /AI/ML REMOTE Salary range: $225K - $250K + Bonus I need a vulnerability manager who manages and motivates people in vulnerability management focus. This is across the enterprise. You will need to be heavy in infrastructure and applications. Meaning: pen testing, red teaming, etc. You need to do tooling road map. You are going to manager 6 fulltime people, 7 contractors, a total of 13 people. Need to have experience bringing vision and advancing mature programs. Advanced skills in metric development. Experience with AI/ML. Looking for someone who can push the boundaries of already mature programs and drive optimization at scale. Enterprise cloud and on premises. Certifications CISSP GSEC OSCP Strongly preferred. Scoring systems CVSS security benchmarks . CIS NIST Scanning tools SAST SCA IAST automation for vulnerability management, machine learning generative AI agent based systems. QUALIFICATIONS: • 8+ years experience w/Bachelor’s degree; 1+ years supervisory/management • Certifications such as CISSP, GSEC, OSCP, or comparable security-related credentials are strongly preferred • Proven experience managing enterprise-scale vulnerability management programs and tools • Expertise in developing, mentoring, and retaining high-performing teams while fostering a mindful, inclusive, and trust-based team culture • Deep understanding of risk-based vulnerability management. • Knowledge of vulnerability scoring systems (CVSS), security benchmarks (CIS, NIST), and risk quantification techniques • Proficiency in selecting, implementing, and managing vulnerability scanning tools (e.g., SAST, SCA, IAST, DAST, Network/Infrastructure, Cloud, etc.) across the technology stack • Experience designing and implementing automation for vulnerability management processes using generative AI, agent-based systems, large language models (LLMs), or machine learning to improve efficiency, effectiveness, and scalability

vulnerability management
penetration testing
red teaming
AI/ML for security automation
CISSP, GSEC, OSCP certifications
CVSS scoring systems
CIS, NIST security benchmarks
SAST, SCA, IAST scanning tools
team management
Verified Source
Posted 3 months ago

Ready to join Request Technology?

Create tailored applications specifically for Request Technology with our AI-powered resume builder

Get Started for Free

Ready to have AI work for you in your job search?

Sign-up for free and start using JobLogr today!

Get Started »
JobLogr badgeTinyLaunch BadgeJobLogr - AI Job Search Tools to Land Your Next Job Faster than Ever | Product Hunt