Vulnerability And Patch Management Specialist

Details of the offer

We are seeking a Vulnerability Management Analyst with experience in enterprise  vulnerability assessment and management.
This role will utilize expertise with  information security to discover, analyze, and characterize risks to Our Clients network,  applications, databases, and other components of Our Clients information system.
The  ideal applicant should be passionate about security, stay up-to-date on the latest  technology and industry best practices, and work well in a collaborative team  environment.
Typical Duties and Responsibilities: Oversee the coordination of security incident response Perform recurring and on-demand scanning of organization systems and cloud environments Resolve information security incidents, including targeted threats and internal incidents Maintain documentation regarding threat management, including policies and procedures Assist technology teams to develop, implement, and automate security solutions Improve and automate existing vulnerability management systems Monitor intrusion detection systems to identify potential threats Research and assess emerging security threats and vulnerabilities Provide technical support for vulnerability management projects Communicate the risks of identified vulnerabilities and recommend security controls to mitigate them Required Skills and Experience: 3+ years of experience in vulnerability management or compliance monitoring Proven experience in vulnerability management, cloud security, and Continuous Threat Exposure Management (CTEM).
Good knowledge of cloud security platforms (e.g., Azure, AWS, Google Cloud), vulnerability scanning tools (e.g., Qualys, Tenable, Nessus) & an understanding of OWASP standards and application security best practices.
Experience in a cybersecurity environment Experience in vulnerability scanning, penetration testing, network admission control, and/or SIEM Experience in design and implementation of security technologies Experience with IT controls monitoring for regulatory and compliance requirements Experience with visualization tools In-depth knowledge of information security best practices Knowledge of technical concepts such as cloud computing, automation, networking, and application development Knowledge of vulnerability data management and reporting process automation Knowledge of OWASP tools and methodologies Knowledge of scripting languages such as Perl or Python Preferred Qualifications: Bachelors degree in computer science, information security, or a related field.
Professional certification such as CEH, Security+, CVA, Qualys, Tenable, AZ-500


Nominal Salary: To be agreed

Requirements

Built at: 2025-03-20T17:41:26.955Z