JOBSEARCHER

Technology Architect | Identity Management | IDAM-Design , work flow , Implementation

Company Description: IMCS Group is one of the fastest growing MWBE (Minority Woman Owned Enterprise) staffing firms in the U.S. We focus on bringing a Diversity Recruitment approach to Fortune 500 companies within North America and EMEA region contingent labor programs. IMCS Group excels in providing top talent in IT, Healthcare, Engineering, Finance, Light Industrial, Contact Center, and Clerical. We have offices in the US, Canada, Mexico, and India in which we can provide support to our clients.Description: Job title - Mobile Device Vulnerability Management & Configuration Compliance EngineerWork location Springfield, Boston or New York/ NJIs it Hybrid, onsite or remote position OnsiteTentative Start date Start Date will be decided based on candidate selection by clientContract duration 12 monthsVendor rate ***Does this position require Visa independent candidates only?YesMinimum years of experience needed in the required skills- 5 years of experienceMinimum over all work experience required - 5 yearsDomain Cyber Security : Application SecurityJD:The Mobile Device Vulnerability Management & Configuration Compliance Engineer will partnerwith internal stakeholders to design, validate, and operationalize an automated mobile devicevulnerability scanning and configuration compliance capability across enterprise-issued mobileendpoints (iOS/iPadOS and Android). This role leads proof-of-technology (PoT) activities includingtool evaluation, architecture validation, security controls mapping, and pilot execution, and drivesfull-scale implementation through integration with other security tools such as MDM, SIEM/SOAR,ITSM, and asset inventory/CMDB systems.The engineer will establish and maintain mobile vulnerability management processes aligned tocorporate and regulatory requirements, develop continuous compliance and policy enforcementstrategies, implement risk-based remediation workflows, and deliver measurable improvements inmobile endpoint security posture.Key Responsibilities" Define PoT scope, success criteria, and test plans for automated mobile vulnerabilityscanning (e.g., agent-based/agentless, MDM-integrated, API-driven)." Evaluate candidate tools for: coverage (OS/app/cert/profile), detection accuracy,scalability, device impact, privacy controls, and reporting fidelity." Execute pilots across representative device populations validating:o vulnerability detection capabilities (OS versions, CVEs, patch levels, risky apps)o configuration compliance checks (encryption, jailbreak/root, screen lock, OShardening)o integration readiness (Intune/Workspace ONE/Jamf; SIEM; ITSM; CMDB)" Produce PoT outcomes: findings, risk analysis, cost/benefit, architecture decision record,and go/no-go recommendation." Coordinate with InfoSec and Compliance teams to ensure SaaS platform posture aligns withregulatory requirements (NYDFS)." Build and run mobile vulnerability lifecycle processes: discovery, assessment, prioritization,remediation, validation, reporting." Establish severity/risk scoring tuned for mobile (exposure, device role, app risk, complianceimpact)." Coordinate remediation with endpoint engineering, mobility admins, app owners, andoperations teams." Validate remediation effectiveness using scanner re-runs, policy compliance, and auditevidence." Develop, deploy, and continuously improve baseline security configurations for iOS/iPadOSand Android." Translate requirements into enforceable policies (password/biometrics, encryption, OSupdate controls, app controls, certificate/profile constraints, VPN/Wi-Fi security, loggingsettings)." Implement compliance monitoring and drift detection; drive automated or semi-automatedcorrective actions." Build automation scripts and APIs to normalize and enrich findings" Support change management and communications for new controls impacting devicebehavior and user experience." Provide technical guidance and training to operations teams for ongoing support.Required Skills" Mobile OS security fundamentals: iOS/iPadOS and Android security models, patching,permissions, app ecosystems, jailbreak/root detection concepts." Vulnerability management expertise: CVE/patch lifecycle, risk-based prioritization, SLAs,validation, metrics." Configuration compliance: baseline hardening, policy enforcement, continuous compliancemonitoring, and drift remediation." Mobility Scanning Tool Experience (hands-on): Qualys Mobile VMDR, Lookout, WorkspaceOne + Microsoft Threat Defense, or equivalent." MDM experience (hands-on): Microsoft Intune, Omnissa Workspace ONE, Jamf Pro, orequivalent." Enterprise integration skills: API integration, data normalization, and automation withSIEM/SOAR/ITSM (e.g., Splunk, Sentinel, QRadar; XSOAR, Sentinel SOAR; ServiceNow)." Identity & access: conditional access concepts, device compliance states, SSO,certificates, MFA, posture-based access controls." Scripting/automation: PowerShell and/or Python; familiarity with REST APIs, JSON, OAuth,and secrets management." Security documentation: ability to author PoT plans, architecture diagrams, operationalrunbooks, and audit evidence." Excellent documentation and stakeholder management skills." Strong analytical and problem-solving skills." Excellent communication and stakeholder management skills; experience presenting PoTresults and recommendations." Ability to work independently and across multifunctional teams." Detail-oriented with a focus on process improvement and operational excellence." Ability to manage multiple workstreams (pilot + integration + operations) with minimalsupervision." Familiarity with NIST, CIS Benchmarks, DISA STIG (mobile), ISO 27001 control mapping, orsimilar frameworks.Educational Requirements" Bachelor s degree in Cybersecurity, Information Systems, Computer Science, Engineering,or equivalent practical experience.Relevant Certifications" CompTIA Security+, CySA+" GIAC: GSEC, GMON, or related (if available/appropriate)" Qualys/Rapid7/Tenable (or equivalent vulnerability platform certifications where relevant)" Governance / Risk / Architecture (bonus)" CISSP, CISM, CCSP" ITIL Foundation (for ITSM integration and operations maturity)Experience Level" 5 8+ years in cybersecurity/endpoint security, with 2 4+ years specifically in mobile/UEMsecurity, vulnerability management, or compliance engineering.Interview mode - In person/Virtual : VirtualHow many rounds of interview minimum 2 rounds.EEOC Disclaimer: IMCS Group is an equal opportunity employer and makes employment decisions without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status, disability status, age, or any other status protected by law. IMCS Group is committed to maintaining an inclusive workforce, where employees are hired, retained, compensated, and promoted based on their contributions to our Company.

matching similar jobs near Springfield, MA

VIEW MORE