Axos Business Center, Corp
About This Job
Axos is building an AI-native security organization that moves at the speed of the business. Our vulnerability management program, powered by Qualys, is the foundation for understanding and reducing risk across every asset class—servers, endpoints, cloud workloads, web applications, and containers. We are looking for a Senior Qualys Administrator & AI Automation Engineer who will own the architecture, operations, and continuous improvement of our Qualys platform while pioneering AI agents that automate routine vulnerability management tasks at machine speed.
This is not a scan-and-report role. You will architect scalable Qualys deployments, build AI-powered agents that eliminate analyst toil, and deliver vulnerability intelligence that drives real remediation outcomes across the enterprise.
Responsibilities
Qualys Platform Architecture & Operations
- Own the end-to-end architecture, configuration, and optimization of the Qualys platform across VMDR, Policy Compliance, Web Application Scanning (WAS), Container Security, and Cloud Agent modules.
- Design and maintain scanner appliance deployment strategy, including network segmentation considerations, authenticated scanning configurations, and cloud connector integrations (Azure, AWS, GCP).
- Manage Qualys Cloud Agent deployment across all endpoint and server populations, ensuring coverage targets are met and agent health is continuously monitored.
- Build and maintain asset tagging taxonomies that align with business unit ownership, regulatory scope (OCC, PCI-DSS), and remediation accountability structures.
- Architect scan scheduling, option profiles, and authentication records to maximize detection accuracy while minimizing operational impact on production systems.
- Serve as the Qualys subject-matter expert for the security organization, troubleshooting platform issues, managing vendor escalations, and evaluating new Qualys modules and features.
AI Agent Development for Vulnerability Management Automation
- Design, build, and operationalize AI agents that automate routine Qualys workflows: scan result triage, vulnerability prioritization, remediation ticket generation, exception request processing, and compliance report assembly.
- Develop prompt-engineered investigation workflows that correlate Qualys vulnerability data with asset context, threat intelligence feeds, and compensating control data to produce prioritized, analyst-ready remediation plans.
- Build automated reporting agents that generate executive dashboards, regulatory compliance summaries, and business-unit-level vulnerability scorecards without manual intervention.
- Create AI-driven SLA monitoring agents that track remediation timelines, escalate aging vulnerabilities, and generate exception documentation when remediation deadlines are at risk.
- Continuously tune AI agent logic based on false-positive analysis, remediation outcome data, and feedback from infrastructure teams to improve accuracy and reduce noise.
- Evaluate and integrate Qualys API capabilities into AI orchestration pipelines, leveraging the Qualys REST API for programmatic scan management, data extraction, and automated asset inventory reconciliation.
Vulnerability Management Program Operations
- Partner with infrastructure, application, and cloud engineering teams to drive remediation of critical and high-severity vulnerabilities within defined SLA timelines.
- Develop and maintain vulnerability management KPIs, dashboards, and trend analyses that provide leadership with actionable risk visibility.
- Instrument Qualys data feeds into Splunk for correlation with broader security telemetry, enabling enriched detection and investigation workflows.
- Manage the vulnerability exception and risk acceptance process, ensuring documentation meets regulatory and audit requirements.
- Maintain runbooks, architecture diagrams, and operational documentation that enable the broader security team to support vulnerability management operations.
- Track the vulnerability management landscape (CVEs, CISA KEV, vendor advisories) and translate emerging risks into actionable scanning and remediation priorities.
Qualifications
Required
- 5+ years in vulnerability management, security engineering, or infrastructure security with deep, hands-on Qualys platform experience in a production enterprise environment.
- Expert-level knowledge of Qualys VMDR, Policy Compliance, Cloud Agent, and WAS modules, including scanner appliance deployment, option profile tuning, and authentication record management.
- Demonstrated experience with the Qualys API for programmatic scan management, data extraction, and integration with ticketing systems (ServiceNow, Jira) and SIEM platforms (Splunk preferred).
- Strong scripting and automation skills in Python (strongly preferred) for building integrations, data pipelines, and reporting automation.
- Solid understanding of enterprise network architecture, firewall segmentation, and how scanning infrastructure interacts with production environments across on-premises and cloud (Azure, AWS) deployments.
- Experience managing vulnerability remediation programs in regulated financial services environments (OCC, PCI-DSS, SOX) with demonstrated ability to drive remediation accountability.
- Strong working knowledge of operating system security (Windows Server, Linux) and common vulnerability classes across infrastructure, web applications, and cloud configurations.
Preferred
- Experience building or integrating AI/LLM-driven workflows for security operations (alert triage, report generation, automated remediation orchestration).
- Familiarity with prompt engineering, AI orchestration frameworks, and API-driven automation patterns for security use cases.
- Qualys certifications (QSSA, QSCA) or equivalent demonstrated platform expertise.
- Experience with container security scanning and cloud workload protection in Qualys or comparable platforms.
- Familiarity with asset discovery and inventory reconciliation challenges in large, distributed enterprise environments.
Why This Role
- You will build, not just govern. This team ships security tooling and automation, not slide decks.
- AI-first security organization: our autonomous SOC pipeline is live and you will extend AI-driven automation into the vulnerability management domain.
- Direct impact at a federally chartered digital bank where vulnerability management decisions are consequential and visible to leadership.
- Work alongside senior practitioners who value intellectual honesty, hands-on craft, and enforceable security over compliance theater.
About Axos
Born digital-first, Axos delivers financial tools and services that allow individuals, small businesses, and companies to access and manage their money how, when, and where they want. We’re a diverse team of dynamic, insightful, and independent innovators who are excited to provide technology-driven solutions that offer unbeatable value to our customers.
Axos Financial is our holding company and is publicly traded on the New York Stock Exchange under the symbol "AX" (NYSE: AX).
Learn More about working at Axos Business Center
Pre-Employment Background Check, Medical, and Drug Test:
All offers are contingent upon the candidate successfully passing a credit check, criminal background check, and pre-employment medical and drug screening.
Equal Employment Opportunity:
Axos is an Equal Opportunity employer. We are committed to providing equal employment opportunities to all employees and applicants without regard to race, religious creed, color, sex (including pregnancy, breast feeding and related medical conditions), gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship status, military and veteran status, marital status, age, protected medical condition, genetic information, physical disability, mental disability, or any other protected status in accordance with all applicable federal, state, and local laws.
Job Functions and Work Environment:
While performing the duties of this position, the employee is required to sit for extended periods of time. Manual dexterity and coordination are required while operating standard office equipment such as computer keyboard and mouse, calculator, telephone, copiers, etc.
The work environment characteristics described here are representative of those an employee may encounter while performing the essential functions of this position. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this position.