Danielm7 wrote: » For some people that's their entire job. They tie it to a ticketing system, deal with false positives, work on remediation plans, assign them to the right people, work on reports for executive levels, etc. Wash, rinse, repeat month after month. You'll find just handing someone a 500 page report of issues doesn't mean anything is going to get done with them, if anything the larger the report the less chance someone is going to handle it.
shochan wrote: » Sounds like they need someone whom knows how to write scripts that actually work. Some of the tools we use, work "halfa$$" and feel like some of the scripts are poorly written & doesn't always patch the system. There is no real confirmation that it actually patched either. I actually work vulnerabilities at my job, but even though there are some easier vulnerabilities to remediate than others. You will always have devices you will have to remote into or physically touch to get it compliant. IMO, it is a boring job and feel like a "Professional Copy & Paste Spreadsheet Analyst" - not what I expected to sign up for...But it pays well and will continue exploring other, more challenging positions.