Vulnerability Management

  • Review existing vuln program

  • Review ticketing system and remediation request handling

  • Determine vuln management data contents by framework

  • Write vulnerability management procedure

  • Provide technical guides to operations staff responsible for vulnerability remediation

  • Review program execution and provide statistical reports