A Senior Vulnerability Management and Configuration Assessment Lead role involves leading vulnerability assessments, analyzing scan results, prioritizing vulnerabilities, and driving remediation efforts. This position requires strong technical skills, a deep understanding of information security principles, and the ability to collaborate with various teams to improve the organization's overall security posture. This role also involves advanced troubleshooting, configuration management, and problem resolution for complex IT systems, often involving escalations from L2 support and working with various stakeholders. This role requires strong technical expertise, excellent communication skills, and the ability to manage and maintain the Configuration Management System (CMS) and Configuration Management Database (CMDB). Knowledge on Penetration Test and related concepts.
Key Responsibilities
- Vulnerability Assessment and Analysis:
- Conducting vulnerability scans across various environments (e.g., cloud, on-premises) using tools like Tenable and Qualys.
- Analyzing scan results to identify security weaknesses and misconfigurations.
- Performing in-depth analysis to understand the root cause of vulnerabilities and potential attack vectors.
- Risk Prioritization and Remediation:
- Prioritizing vulnerabilities based on factors like severity, exploitability, and potential impact.
- Work with IT and DevOps teams to develop and implement remediation plans.
- Tracking remediation progress and ensuring timely closure of vulnerabilities.
- Threat Intelligence and Monitoring:
- Monitoring threat intelligence feeds and security advisories for emerging threats and vulnerabilities.
- Assessing the potential impact of new threats and vulnerabilities on the organization's infrastructure.
- Refining vulnerability prioritization and remediation strategies based on threat intelligence.
- Documentation and Reporting:
- Creating and maintaining vulnerability management documentation, including policies, procedures, and reports.
- Developing and maintaining vulnerability dashboards and metrics to track the effectiveness of vulnerability management activities.
- Collaboration and Communication:
- Collaborating with various teams, including security architecture, application development, and risk management, to address vulnerabilities and improve security posture.
- Communicating the risks associated with vulnerabilities to stakeholders and providing guidance on mitigation strategies.
- Mentoring and guiding junior team members on vulnerability management principles and practices.
Skills And Experience
- Strong understanding of information security principles and practices.
- Proficiency in vulnerability scanning tools and techniques.
- Experience with Risk Assessment methodologies and vulnerability scoring systems.
- Knowledge of Cloud Security concepts and best practices.
- Excellent communication, collaboration, and problem-solving skills.
- Proficiency in relevant technologies, including operating systems (Windows, Linux), networking protocols (TCP/IP, DNS, DHCP).
- Understanding of ITIL principles with respect to Asset and Configuration Management.
- Ability to clearly communicate technical information to both technical and non-technical audiences.
- Ability to work effectively with other IT professionals and stakeholders.
Experience in maintaining and managing a CMDB.