Cybersecurity Vulnerability Analyst I (REMOTE)
Posted 2026-05-05
Remote, USA
Full-time
Immediate Start
Employment Type:
Full time
Shift:
Description:
Purpose
Responsible for the data capture, analysis& reporting of data information to assist the Trinity Health leadership team achieve operational efficiency. Responsible for auditing of department information, producing reports& suggesting improvements to processes. Provides knowledge& expertise in the program, services& applications.
Note: “patients” refers to patients, clients, residents, participants, customers, members
Essential Functions
- Our Trinity Health Culture: Knows, understands, incorporates& demonstrates our Trinity Health Mission, Values, Vision, Actions& Promise in behaviors, practices& decisions.Work Focus:
- Researches, collects& analyzes information. Identifies opportunities, develops solutions,& leads through resolution.
- Collaborates on performance improvement activities as indicated by outcomes in program efficiency& patient experience.
- Responsible for distribution of analytical reports.
- Process Focus:
- Utilizes multiple system applications to perform analysis, create reports& develop educational materials.
- Incorporates basic knowledge of Trinity Health policies, practices& processes to ensure quality, confidentiality& safety are prioritized.
- Demonstrates knowledge of departmental processes& procedures& ability to readily acquire new knowledge.
- Data Management& Analysis:
- Research& compiles information to support ad-hoc operational projects& initiatives.
- Synthesizes& analyzes data& provides detailed summaries including graphical data presentations illustrating trends& recommending practical options or solutions while considering the impact on business strategy& supporting leadership decision making.
- Leverages program& operational data& measurements to define& demonstrate progress, ROI& impacts.
- Maintains a Working Knowledge of applicable federal, state& local laws / regulations, Trinity Health Integrity& Compliance Program& Code of Conduct, as well as other policies, procedures& guidelines in order to ensure adherence in a manner that reflects honest, ethical& professional behavior& safe work practices.
- Functional Role (not inclusive of titles or advancement career progression)
- The Vulnerability Management Analyst I is responsible for identifying, assessing, and assisting in the remediation of security vulnerabilities across the organization’s infrastructure, applications, and endpoints. This role requires collaboration with cross-functional teams to ensure vulnerabilities are addressed promptly and effectively while enhancing the organization's overall security posture.
- Conduct regular vulnerability scans and assessments using enterprise tools (e.g., CrowdStrike Falcon, Tenable, Qualys, Rapid7, etc.).
- Analyze scan results to identify vulnerabilities, prioritize risk levels, and produce actionable reports.
- Collaborate with IT, development, and business teams to validate, remediate, or mitigate identified vulnerabilities.
- Support the monitoring of threat intelligence feeds and the mapping of emerging threats to the organization’s attack surface.
- As assigned, assist in maintaining and improving processes for vulnerability lifecycle management, including discovery, tracking, reporting, and closure.
- Participate in post-remediation validation to verify the effectiveness of implemented fixes.
- pay grade 12 range 66,309.3907-99,464.0861 Actual compensation will fall within the range but may vary based on factors such as experience, qualifications, education, location, licensure, certification requirements, and comparisons to colleagues in similar roles.
- Minimum Qualifications
- Associates degree in Cybersecurity, Information Technology, or Computer Science. Equivalent combination of education and applicable experience considered in lieu of degree.
- One (1) to two (2) years of experience in vulnerability management, cybersecurity, or information technology roles.
- Familiarity with asset management and discovery solutions.
- Understanding of vulnerability assessment tools and methodologies.
- Strong analytical skills with the ability to interpret vulnerability data and communicate risk effectively.
- Exposure to patch management processes and tools.
- PHYSICAL AND MENTAL REQUIREMENTS AND WORKING CONDITIONS
- This position operates in a typical office environment. The area is well lit, temperature-controlled and free from hazards.
- Incumbent communicates frequently, in person and over the telephone