Security Analyst in Vendor Risk Management analyzing data-driven vulnerability detections for Vanta. Collaborating with teams to improve scanning operations and detection logic.
Responsibilities
Perform deep-dive analysis on raw scanning signals to assess the quality, accuracy, and fidelity of our vulnerability detections.
Systematically identify and analyze false positives and false negatives, working with Researchers to refine detection logic and improve signal-to-noise.
Use data analysis to draw insights about our detection coverage, classification accuracy, and overall data quality, directly impacting the product roadmap.
Collaborate with Security Researchers by providing data-driven analysis to guide new research and pinpoint high-impact areas for investigation.
Develop and monitor key performance indicators (KPIs) and dashboards related to our detection quality and scanning operations.
Work with the Engineering team to provide feedback on data models and platform capabilities needed for better analysis.
Requirements
Proven experience in a data-driven role, such as a Data Analyst, Security Data Analyst, Product Analyst, or BI Analyst.
Strong analytical skills with the ability to query, manipulate, and draw insights from large, complex datasets (e.g., SQL, Python with Pandas, or similar).
A foundational understanding of cybersecurity concepts (e.g., networking, vulnerabilities, cloud infrastructure) and a strong desire to learn more.
Excellent problem-solving skills and a meticulous attention to detail.
Experience in measuring and reporting on data quality or product performance is a significant plus.
Self-motivated and capable of working both independently and collaboratively within a team.
Strong communication skills, with the ability to translate complex data findings into clear, actionable recommendations.
Benefits
Industry-competitive salary and equity
Health plan premium reimbursement
Pension contribution
16 weeks fully paid parental leave for all new parents
Health & wellness stipend
Remote workspace stipend
Flexible work hours and location
Virtual team building activities, lunch and learns, and other company-wide events!
Senior Cyber Security Analyst at Peach Payments responsible for facilitating security operations in Cape Town hub. Ensuring compliance and supporting security infrastructure for digital payments across Africa.
Information Security Analyst managing information security processes at Keyloop. Ensuring compliance with industry standards and collaborating with teams for vulnerability management.
Cyber Threat Intelligence Analyst supporting IT Security team in identifying and mitigating cyber threats. Ensuring network security and protecting company secrets in high - tech environment.
Risk Analyst supporting cyber risk management activities for PokerStars and other brands. Ensuring accurate risk documentation, reporting, and stakeholder engagement in Cluj - Napoca, Romania.
Cyber Security Analyst responsible for governance, risk management, and compliance projects for clients and internally at Cyberlogic. Engaging with clients on project - based work while developing policies and standards.
Analista de segurança de informação supporting the maintenance of data privacy and protection programs at Minsait. Involves audit support, training, and compliance with legislation.
IT Security Analyst assisting in managing technology environments ensuring security compliance. Supporting Brasilseg's platforms with adherence to best practices in software and hardware.
Senior Cybersecurity Analyst applying RMF concepts to enhance cybersecurity for defense program. Conducting risk assessments and developing reports, based in Colorado Springs, CO.
Junior Information Security Analyst assisting federal clients at OCT Consulting with NIST security assessments and risk analyses. Responsible for executing hands - on security control assessments and recommending process improvements.
Journeyman Information Security Analyst providing expertise to federal clients in Security Controls Assessments and Risk Analyses. Responsibilities include technical assessments and recommendations for security improvements.