Home
Jobs

1 Armis Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 12.0 years

18 - 27 Lacs

Pune

Work from Office

Naukri logo

The Vulnerability Management Engineer II is responsible for managing the identification, assessment, reporting, and mitigation of infrastructure and cloud vulnerabilities. A candidate for this role will have a mindset of a defender and be able to operate in a fast-paced environment working closely with our infrastructure team that includes Network, Firewall, Hypervisors, Servers, and business application teams. Key Responsibilities: • Serve in a contributing role that requires frequent interaction with IT and Infosec managers, engineers and developers. • Provide vulnerability remediation governance and operational support. • Perform vulnerability metrics reporting for ad-hoc and scheduled metrics report for various KPIs (Key Performance Indicators) around vulnerability management activities. • Drive and track remediation initiatives across multiple support teams. • Respond to questions from stakeholders about remediation and vulnerability assessment results and actions. • Collaborate with support groups/stakeholders on details about identified vulnerabilities. EXPERIENCE AND EDUCATIONAL REQUIREMENTS: • Bachelors degree in Computer Science, Cybersecurity or other related field, or equivalent work experience. • Proficient in various vulnerability assessment tools such as Qualys, Armis, Microsoft Defender for Endpoint/Cloud. • Ability to analyze vulnerability metrics using Microsoft Excel advanced techniques. • 5-8years of combined IT and security work experience with a broad range of exposure to cybersecurity, systems analysis, application development and/or systems administration and 3+ years of vulnerability management experience. • Requires Security Certification(s) (i.e., Certified Information Systems Security Professional (CISSP), or Certified Information Security Manage (CISM), Certificate of Cloud Security Knowledge (CCSK), Offensive Security Certified Professional (OSCP) or other equivalent recognized security certifications. • Good understanding of industry standard regulations and risk management frameworks and standards (e.g., ISO, PCI, NIST, COBIT, GAPP, HIPAA, GDPR). • Familiarity with SANS Top 25 controls, OWASP Top 10 and/or MITRE ATT&CK framework • Excellent communication skills: able to explain complex concepts clearly to both technical and non-technical stakeholders. Skills Desired: • Exposure or knowledge of cloud architectures, services, and vulnerabilities. • Understanding of risk assessment methodologies. • Proficiency in using vulnerability scanning tools such as Qualys, Armis, MS Defender, etc. • Ability to interpret vulnerability data from multiple sources. • Reporting and metrics expertise with platforms such as ServiceNow (SecOps), PowerBI, etc.

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies