Infrastructure Vulnerability Management Professional

3 - 7 years

5 - 9 Lacs

Posted:Just now| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

  • Full Time
Work youll do:
  • As an Attack Surface Management Senior Consultant, you will assist our clients with discovering vulnerabilities and rogue assets (such as shadow IT) in their networks as part of a team of engineers and analysts around the world who specialize in the tactics, tools and procedures used by cyber criminals.
  • Configure and execute vulnerability scans enumerating vulnerabilities within the internal and external network
  • Analyze, enrich, and prioritize specific activities designed to remediate discovered vulnerabilities such as patch deployment or configuration hardening
  • Assist in producing a comprehensive operating picture and cyber security situational awareness
  • Work with various vulnerability threat feeds (such as vendor bulletins), assessment tools, asset inventory tools as well as reporting tools and frameworks to match assets to identified vulnerabilities and produce reports
  • Respond to requests for ad-hoc reporting and research topics from management and analysts as required
  • Identify gaps in available asset information and engage with leadership on strategies to meet service-level requirements through affirmative handoff with remediation partners
  • Quickly understand and deliver on company and customer requirements
  • Aid in and participate in daily, weekly, quarterly, and yearly reporting for clients, partners, and internal teams
  • Adhere to internal operational security and policies
Qualifications Required:
  • Bachelors degree or higher in Attack Surface Management, Information Security, Information Technology, Computer Science, Math, or any other related area
  • 3-7 years of experience working in information technology vulnerability management, information security, incident response, red team operations, application security, reverse engineering, or other technical cyber security roles
  • Certified Information Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent
  • Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.
  • Understanding of common network infrastructure devices such as routers and switches
  • Understanding of basic networking protocols such as TCP/IP, DNS, HTTP
  • Understanding of vulnerability classification using National Vulnerability Database nomenclature such as CVE/CVSS
  • Basic knowledge in system security architecture and security solutions
Preferred:
  • Proven ability to translate complex information sets into specific recommendations that can be actioned by customers to enhance their security posture
  • Familiarity with cyber threats, defenses, motivations, and techniques
  • Experience with vulnerability analysis tools such as Qualys or Tenable, and the asset provisioning/deprovisioning lifecycle
  • Patch management skills and technology application such as Microsoft System Center Configuration Manager (SCCM)
  • Experience distilling raw information into actionable intelligence
  • Outstanding English written and oral communication skills and the ability to prioritize work
  • Strong understanding of threat analysis and enterprise level, mitigation strategies
  • Working knowledge of how malicious code operates and how technical vulnerabilities are exploited
  • Strong knowledge of operating systems and networking technologies in general
  • Strong knowledge of databases, query design, and how to analyze data thus obtained
  • Knowledge of supporting toolsets such as Confluence, Jira, and Configuration Management Databases (CMDB) such as ServiceNow
  • Strong analytical and problem-solving skills
  • Self-motivated to improve knowledge and skills
  • A strong desire to understand the what as well as the why and the how of security incidents
Primary skills

vulnerability assessment management

VM implementation

CIS Baseline

tools like rapid 7

enable , qualys guard ( certifications are added advantage ) Certifications CISSP ( Certified information system security professional ) good to have Client facing role

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You

kolkata, mumbai, hyderabad, pune, gurugram, chennai, bengaluru

kolkata, mumbai, hyderabad, pune, gurugram, chennai, bengaluru