Job Title: FedRAMP Vulnerability Management Engineer
Location: Remote
Duration: 6 months
Job Description
Job Brief:
The FedRAMP Vulnerability Management Engineer is a contract role that builds and maintains the technical foundation for vulnerability reporting and automated ticketing in a FedRAMP authorized SaaS environment. The engineer will integrate Prisma Cloud and Tenable, create dashboards, and automate ticket workflows so security, engineering, and compliance teams have real-time visibility into findings and remediation progress while meeting FedRAMP Continuous Monitoring expectations. Python is the primary language for all data extraction, transformation, and workflow automation.
Responsibilities:
• Design Python data pipelines that pull results from Prisma Cloud and Tenable, normalize the data, and load it into a warehouse or lake for analytics.
• Develop Python automation that creates, updates, and closes Jira tickets in line with service-level agreements and escalation rules.
• Build and maintain dashboards in Grafana, Looker, or a similar platform to show open findings by severity, aging, and ownership for Continuous Monitoring.
• Integrate Slack or email alerts so engineers receive notifications when new critical issues surface or tickets approach breach.
• Create reusable Python libraries and API clients for Prisma Cloud, Tenable, and Jira to standardize data extraction and ticket actions.
• Work with DevOps to ensure Prisma Cloud and Tenable agents run consistently across container and compute environments such as EKS, ECS, and Kubernetes.
• Document runbooks, configuration guides, and data dictionaries to support audits and daily operations.
• Optimize queries and storage models to handle large vulnerability datasets while controlling cost.
• Map dashboard fields to required FedRAMP artifacts such as the POA&M and the
System Security Plan.
• Evaluate new Prisma Cloud and Tenable features and recommend enhancements that improve coverage or reduce manual effort.
Requirements:
• Minimum three years building data integrations or automation in a security or DevOps context.
• Demonstrated success automating Jira workflows for vulnerability or incident management.
• Proven track record creating dashboards that communicate security status to technical and executive audiences.