Posted:8 hours ago|
Platform:
On-site
Part Time
Vulnerability Assessment & Management
Manage vulnerability programs for IT assets, containers (e.g., Docker, Kubernetes), and base golden images across operating systems (Windows, Linux, Unix).
Conduct regular scans using industry-standard tools.
Analyze and prioritize vulnerabilities based on risk, exploitability, and asset criticality.
Track and report remediation progress.
Security Operations
Collaborate with IT, DevOps, and development teams for timely remediation.
Develop policies and remediation plans, including golden image review processes.
Support incident response for vulnerability exploits.
Assess risks and recommend mitigation strategies.
Reporting & Communication
Create executive dashboards on vulnerability and golden image security status.
Communicate findings to technical teams and leadership.
Maintain accurate vulnerability, asset, and golden image inventories.
Change Management
Continuous Improvement
Stay updated on emerging threats, vulnerabilities, and golden image security best practices.
Recommend tools for vulnerability, container, and golden image security management.
Support penetration testing, audits, and security training.
Required Qualifications
Technical Skills
2+ years in vulnerability management, cybersecurity or related experience.
Deep, hands-on expertise with leading vulnerability scanning platforms (Tenable, Qualys, etc.)
Assessment of golden image reviews for Windows, Linux, Unix and Containers.
Familiarity with network protocols, operating systems, and cloud platforms (AWS, Azure, GCP).
Experience with patch and configuration management tools (e.g., Tanium, Intune, SSM, JAMF).
Expert understanding of the vulnerability lifecycle, risk assessment, and advanced prioritization techniques (CVSS, EPSS, CWE, CISA KEV).
Understanding of frameworks like NIST, OWASP.
Familiarity with compliance standards (e.g., PCI DSS, SOX).
Knowledge of threat modeling and penetration testing. Familiar with scripting languages.
General skills:
Strong critical thinking and analytical skills
Ability to approach problem solving in a constructive and collaborative way that does not require absolute security.
EDUCATIONAL REQUIREMENTS:
Bachelor’s degree in computer science, Information Systems, or equivalent combination of education and experience
Certifications in the field of Information Security (at least one of the following: CEH, GIAC CPEN, OSCP, OSWE, CWAPT, GWAPT, GWEB)
EXPERIENCE REQUIRED:
A minimum of 2 years of experience.
Fanatics E-Commerce (India) LLP
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Salary: Not disclosed
hyderabad, telangana, india
Salary: Not disclosed
thiruvananthapuram
3.0 - 7.0 Lacs P.A.
gurgaon, haryana, india
Salary: Not disclosed
7.0 - 11.0 Lacs P.A.
Salary: Not disclosed
chennai, tamil nadu
Salary: Not disclosed
22.5 - 25.0 Lacs P.A.
6.0 - 16.0 Lacs P.A.
37.5 - 45.0 Lacs P.A.