Cybersecurity Vulnerability Scanning Engineer

AT&T AT&T · Telecom · Charlotte, NC

Seeking a Cybersecurity Vulnerability Scanning Engineer with 5-7 years of experience, focusing on managing and executing vulnerability scans using Tenable Vulnerability Management across enterprise infrastructure. Responsibilities include scan scheduling, configuration, troubleshooting, and reporting, with a need for Linux/Unix administration and networking fundamentals. Desired skills include tuning Tenable policies, scripting, cloud environments, and familiarity with AI/ML in cybersecurity.

What you'd actually do

  1. Manage day-to-day operations of infrastructure vulnerability scanning using Tenable Vulnerability Management (e.g., Tenable.io/Tenable.sc), including scan scheduling, execution, and monitoring.
  2. Configure, run, and maintain authenticated scans (credentialed checks) for Windows, Linux/Unix, and network devices, including credential management and troubleshooting failed authentications.
  3. Perform Linux server system administration in support of the infrastructure vulnerability scanning platform (e.g., scanner hosts), including OS hardening, patching, performance monitoring, log review, certificate management, and troubleshooting.
  4. Execute and tune non-authenticated scans for external and internal perspectives where applicable, ensuring safe scanning practices and minimal operational impact.
  5. Maintain scan coverage and accuracy through target management, asset classification, exclusions, and scanner placement considerations.

Skills

Required

  • cybersecurity experience
  • infrastructure vulnerability scanning
  • Tenable Vulnerability Management
  • authenticated scanning
  • Linux/Unix administration
  • networking fundamentals

Nice to have

  • Tenable scan policy tuning
  • vulnerability management workflows
  • network administration
  • scripting/automation (Python, PowerShell, Bash)
  • cloud and hybrid environments
  • AI/ML in cybersecurity

What the JD emphasized

  • 5–7 years of cybersecurity experience, with demonstrated experience operating vulnerability scanning programs for infrastructure.
  • Hands-on experience with Tenable Vulnerability Management, including scan policy configuration, scanners, targets/assets, and results analysis.
  • Strong knowledge of authenticated (credentialed) scanning concepts and common credential types (local/domain accounts, SSH keys, SNMP, etc.).
  • Working knowledge of Windows and Linux/Unix administration concepts (services, packages, patching, permissions) to support scan troubleshooting and validation.
  • Solid understanding of networking fundamentals (TCP/IP, ports, routing, firewalls, VLANs) and how they affect scan reachability and performance.