
Vulnerability Data Analyst
Jobs via Dice, Harrison, ME, United States
Only qualified
Vulnerability Analyst
candidates located near Purchase, New York will be considered due to the requirement for onsite presence.
Required Qualifications/Skills/Experience
Power BI & SQL proficiency
Data analytics experience
Specialization in Vulnerability Management
Role
As a Vulnerability Analyst II with a data focus, you will be responsible for improving the quality, consistency, and usability of vulnerability management data across multiple sources by developing harmonized datasets, implementing data quality controls, and creating clear, actionable reporting for both operational teams and leadership.
Duties
This role leverages strong Power BI and SQL skills to build dashboards, analyze trends, and translate complex data into informed remediation decisions.
The analyst collaborates closely with engineering, application, cloud, and governance teams to strengthen upstream data and support exception and prioritization processes.
A solid understanding of vulnerability management tools, security concepts, and risk-based methodologies is required to ensure insights directly drive measurable risk reduction.
#J-18808-Ljbffr
Vulnerability Analyst
candidates located near Purchase, New York will be considered due to the requirement for onsite presence.
Required Qualifications/Skills/Experience
Power BI & SQL proficiency
Data analytics experience
Specialization in Vulnerability Management
Role
As a Vulnerability Analyst II with a data focus, you will be responsible for improving the quality, consistency, and usability of vulnerability management data across multiple sources by developing harmonized datasets, implementing data quality controls, and creating clear, actionable reporting for both operational teams and leadership.
Duties
This role leverages strong Power BI and SQL skills to build dashboards, analyze trends, and translate complex data into informed remediation decisions.
The analyst collaborates closely with engineering, application, cloud, and governance teams to strengthen upstream data and support exception and prioritization processes.
A solid understanding of vulnerability management tools, security concepts, and risk-based methodologies is required to ensure insights directly drive measurable risk reduction.
#J-18808-Ljbffr