Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Staff IT Analyst II Cyber Senior Vulnerability Management Analyst.
United States Jobs Expertini

Urgent! Staff IT Analyst II Cyber - Senior Vulnerability Management Analyst Job Opening In Dallas – Now Hiring Western Alliance Bank

Staff IT Analyst II Cyber Senior Vulnerability Management Analyst



Job description

Job Title:

Staff IT Analyst II Cyber - Senior Vulnerability Management Analyst

Location:

Block 23

What you'll do:

The Business Information Security Office (BISO), part of Western Alliance Bank's (WAB) enterprise security organization, serves as the frontline connection between the security programs and technology teams responsible for managing security risks and vulnerabilities.

The Vulnerability Management (VM) program within the BISO organization establishes standards, direction, and priorities for vulnerability management processes, and works with security peers, IT program owners, infrastructure teams, and application teams to identify, assess, prioritize, and track the resolution of vulnerabilities in WAB’s cloud and on-premises environments.

The Staff IT Analyst II – Cyber is a cross functional role within the VM program that is responsible for driving strategy, ensuring the adoption of requirements, and collaborating with peers who manage vulnerability scans, threat intelligence platforms, exceptions processes and risk reporting.

This position is tasked with supporting WAB’s IT organization and business units by analyzing scan results, conducting risk assessments, monitoring remediation progress, automating manual tasks, and ensuring information is well communicated and actionable to enable timely remediation.
  • Assist with defining and implementing strategy, processes, procedures, and controls for vulnerability management, threat exposure management, and compliance scanning.
  • Review and validate vulnerability scan results from various platforms (e.g., Wiz, Rapid7) for accuracy and relevance and support investigations into false positive detections.
  • Support the implementation, management, and maintenance of vulnerability management and external attack surface platforms or tools, including identifying and resolving technical or functional issues and ensuring reliable platform operations.
  • Lead the planning and implementation of security measures to protect cybersecurity practices, processes and IT systems.
  • Design, monitoring, and evaluation of security safeguards by analyzing these items to identify potential security threats.
  • Develop strategies to protect security practices, processes, or IT systems from cyber-attacks.
  • Maintain security systems or capabilities by installing, configuring and/or maintaining software, and assisting in monitoring the company network/system for breaches or vulnerabilities.
  • Design scripts and deploy automated solutions to streamline manual processes involved in information collection and consolidation.
  • Track open vulnerabilities from identification through resolution, coordinating with IT program and asset owners or escalating issues as needed.
  • Provide support for developing customized compliance policy scanning rulesets based on CIS benchmarks.
  • Work with security, IT teams, and other stakeholders to assess the impact of vulnerabilities in WAB’s environment and establish appropriate mitigating controls.
  • Recommend and apply measures to address and resolve vulnerabilities or security exposures.
  • Prepare and deliver vulnerability reports and dashboards for technical teams, leadership, and business stakeholders.
  • Identify recurring vulnerabilities and trends to assist in long-term risk reduction strategies.
  • Lead the planning and implementation of security measures to protect cybersecurity practices, process, and IT systems.
  • Support vulnerability management and information security by increasing awareness and use of security services.
  • Design and improve KRIs, KPIs, and operational metrics for different audiences and organizational needs.
  • Stay informed about new vulnerabilities, cyber threats, and attack vectors.
  • Participate in audits and examinations as a subject matter expert when required.
  • Propose and spearhead process improvements to enhance the VRM program.
  • What you'll need:

  • 5+ years of related experience in vulnerability management, threat management, security operations, or a related cybersecurity discipline.
  • Bachelor’s degree in computer science, IT or related field required.
  • Proficiency with vulnerability management tools (e.g., Rapid 7 Insight VM, Qualys, Wiz), and patch/configuration management hardening guidelines and approaches.
  • Experience with ServiceNow Vulnerability Response, CIS WorkBench, PowerBI and Power Automate for tracking, reporting, and process automation.
  • Solid understanding of operating systems (Windows, Linux), networking concepts, and cloud platforms (AWS, Azure, GCP).
  • An intermediate knowledge of general Financial Services or Banking is preferred.
  • Intermediate knowledge of applicable regulatory and legal compliance obligations, rules and regulations, industry standards and practices.
  • Experience applying risk-based prioritization in a hybrid technology environment.
  • Intermediate to advanced knowledge of cybersecurity policies and procedures, Privacy principles and practices, and vulnerability assessment tools and techniques.
  • Intermediate to advanced knowledge of the risk and controls associated with Cybersecurity Program domains including Data Protection, Threat/Vulnerability Management, BCP/DR, security governance & assessment, security training & awareness, network security, cloud security, emerging technology controls (e.g. AI, blockchain), third-party suppliers, security operations, etc.
  • Intermediate speaking and writing communication skills.
  • Strong analytical skills and the ability to communicate technical findings to non-technical audiences.
  • CompTIA Security+, CompTIA A+, GIAC Information Security Fundamentals (GISF), Certified Information Systems Auditor (CISA), Certified in Risk of IT System Controls (CRISC), Certified in Cloud Security Knowledge (CCSK), or GIAC Security Essentials (GSEC) preferred.
  • Benefits you’ll love:
    We offer all the important things you'd want — like competitive salaries, an ownership stake in the company, medical and dental insurance, time off, a great 401k matching program, tuition assistance program, an employee volunteer program, and a wellness program.

    In addition, you’ll have the opportunity to bolster your business knowledge, learning the ins and outs of how successful companies operate and manage their finances, giving you invaluable hands-on experience to help grow your career!


    Required Skill Profession

    Computer Occupations



    Your Complete Job Search Toolkit

    ✨ Smart • Intelligent • Private • Secure

    Start Using Our Tools

    Join thousands of professionals who've advanced their careers with our platform

    Rate or Report This Job
    If you feel this job is inaccurate or spam kindly report to us using below form.
    Please Note: This is NOT a job application form.


      Unlock Your Staff IT Potential: Insight & Career Growth Guide


    • Real-time Staff IT Jobs Trends in Dallas, United States (Graphical Representation)

      Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for Staff IT in Dallas, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 42576 jobs in United States and 353 jobs in Dallas. This comprehensive analysis highlights market share and opportunities for professionals in Staff IT roles. These dynamic trends provide a better understanding of the job market landscape in these regions.

    • Are You Looking for Staff IT Analyst II Cyber Senior Vulnerability Management Analyst Job?

      Great news! is currently hiring and seeking a Staff IT Analyst II Cyber Senior Vulnerability Management Analyst to join their team. Feel free to download the job details.

      Wait no longer! Are you also interested in exploring similar jobs? Search now: .

    • The Work Culture

      An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at Western Alliance Bank adheres to the cultural norms as outlined by Expertini.

      The fundamental ethical values are:
      • 1. Independence
      • 2. Loyalty
      • 3. Impartiality
      • 4. Integrity
      • 5. Accountability
      • 6. Respect for human rights
      • 7. Obeying United States laws and regulations
    • What Is the Average Salary Range for Staff IT Analyst II Cyber Senior Vulnerability Management Analyst Positions?

      The average salary range for a varies, but the pay scale is rated "Standard" in Dallas. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.

    • What Are the Key Qualifications for Staff IT Analyst II Cyber Senior Vulnerability Management Analyst?

      Key qualifications for Staff IT Analyst II Cyber Senior Vulnerability Management Analyst typically include Computer Occupations and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.

    • How Can I Improve My Chances of Getting Hired for Staff IT Analyst II Cyber Senior Vulnerability Management Analyst?

      To improve your chances of getting hired for Staff IT Analyst II Cyber Senior Vulnerability Management Analyst, consider enhancing your skills. Check your CV/Résumé Score with our free Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.

    • Interview Tips for Staff IT Analyst II Cyber Senior Vulnerability Management Analyst Job Success
      Western Alliance Bank interview tips for Staff IT Analyst II Cyber   Senior Vulnerability Management Analyst

      Here are some tips to help you prepare for and ace your job interview:

      Before the Interview:
      • Research: Learn about the Western Alliance Bank's mission, values, products, and the specific job requirements and get further information about
      • Other Openings
      • Practice: Prepare answers to common interview questions and rehearse using the STAR method (Situation, Task, Action, Result) to showcase your skills and experiences.
      • Dress Professionally: Choose attire appropriate for the company culture.
      • Prepare Questions: Show your interest by having thoughtful questions for the interviewer.
      • Plan Your Commute: Allow ample time to arrive on time and avoid feeling rushed.
      During the Interview:
      • Be Punctual: Arrive on time to demonstrate professionalism and respect.
      • Make a Great First Impression: Greet the interviewer with a handshake, smile, and eye contact.
      • Confidence and Enthusiasm: Project a positive attitude and show your genuine interest in the opportunity.
      • Answer Thoughtfully: Listen carefully, take a moment to formulate clear and concise responses. Highlight relevant skills and experiences using the STAR method.
      • Ask Prepared Questions: Demonstrate curiosity and engagement with the role and company.
      • Follow Up: Send a thank-you email to the interviewer within 24 hours.
      Additional Tips:
      • Be Yourself: Let your personality shine through while maintaining professionalism.
      • Be Honest: Don't exaggerate your skills or experience.
      • Be Positive: Focus on your strengths and accomplishments.
      • Body Language: Maintain good posture, avoid fidgeting, and make eye contact.
      • Turn Off Phone: Avoid distractions during the interview.
      Final Thought:

      To prepare for your Staff IT Analyst II Cyber Senior Vulnerability Management Analyst interview at Western Alliance Bank, research the company, understand the job requirements, and practice common interview questions.

      Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the Western Alliance Bank's products or services and be prepared to discuss how you can contribute to their success.

      By following these tips, you can increase your chances of making a positive impression and landing the job!

    • How to Set Up Job Alerts for Staff IT Analyst II Cyber Senior Vulnerability Management Analyst Positions

      Setting up job alerts for Staff IT Analyst II Cyber Senior Vulnerability Management Analyst is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!