logo

View all jobs

Vulnerability & Patch Management Engineer

Atlanta, GA
Job Title: Vulnerability & Patch Management Engineer

Location: Atlanta, GA (Local Candidates only)
Duration: ~6 Months
Work Hours: Hybrid (Some evenings; NTE 40 hrs/week)

Key Skills: Vulnerability Management, Patch Management, Qualys, Microsoft Defender, PatchMyPC, CVE, CVSS, CISA KEV, Windows Server, Windows Endpoints, Linux, Security Reporting, CIS Benchmarks, NIST

Preferred Qualifications: Microsoft Intune, SCCM, Azure Update Manager, Azure Arc, ServiceNow, PowerShell, Bash, Python scripting, enterprise or government environment experience

Job Description:

The Vulnerability & Patch Management Engineer is responsible for identifying, assessing, and reducing security vulnerabilities across enterprise server and workstation environments. This role supports scheduled vulnerability scanning, risk analysis, patch coordination, remediation validation, and security reporting to improve the organization’s overall security posture and compliance maturity.

Job Responsibilities 
  • Perform recurring vulnerability scans across server and endpoint environments.
  • Analyze scan results to identify actionable risks, false positives, and exposure levels.
  • Prioritize vulnerabilities using CVSS, CISA KEV, and industry risk frameworks.
  • Coordinate with infrastructure and application teams on patching and remediation schedules.
  • Support monthly and quarterly patch cycles for servers and workstations.
  • Validate remediation success and assist with configuration hardening.
  • Develop dashboards and reports covering remediation progress, aging vulnerabilities, and SLA/KPI compliance.
  • Operate and optimize vulnerability scanning and endpoint management tools.
  • Integrate vulnerability findings into ticketing/workflow systems (e.g., ServiceNow, Jira).
  • Support security standards, audits, and documentation including SOPs and runbooks.

Required Qualifications
  • 3–7 years of experience in vulnerability management, patch management, or endpoint/server security operations.
  • Hands-on experience with Windows Server and Windows desktop environments.
  • Experience operating vulnerability scanning and patching tools such as Qualys, Microsoft Defender, Intune, SCCM, Azure Update Manager, or PatchMyPC.
  • Strong understanding of CVEs, CVSS scoring, exploitability, and common threat vectors.
  • Ability to analyze scan data, identify false positives, and provide clear remediation guidance.

Email your resume tousjobs@mavensoft.com
To learn more about Mavensoft visit us online at http://www.mavensoft.com/

 

Share This Job

Powered by