Infrastructure Vulnerability Management

IT - Software

As per company norms

Hyderabad, Mumbai, Bangalore, Gurgaon, Chennai, Pune, Kolkata (Hybrid Mode)., India

  • Full Time

Work you'll do:

  • As an Attack Surface Management Senior Consultant, you will assist our clients with discovering vulnerabilities and rogue assets (such as shadow IT) in their networks as part of a team of engineers and analysts around the world who specialize in the tactics, tools and procedures used by cyber criminals.
  • Configure and execute vulnerability scans enumerating vulnerabilities within the internal and external network
  • Analyze, enrich, and prioritize specific activities designed to remediate discovered vulnerabilities such as patch deployment or configuration hardening
  • Assist in producing a comprehensive operating picture and cyber security situational awareness
  • Work with various vulnerability threat feeds (such as vendor bulletins), assessment tools, asset inventory tools as well as reporting tools and frameworks to match assets to identified vulnerabilities and produce reports
  • Respond to requests for ad-hoc reporting and research topics from management and analysts as required
  • Identify gaps in available asset information and engage with leadership on strategies to meet service-level requirements through affirmative handoff with remediation partners
  • Quickly understand and deliver on company and customer requirements
  • Aid in and participate in daily, weekly, quarterly, and yearly reporting for clients, partners, and internal teams
  • Adhere to internal operational security and policies

Qualifications Required:

  • Bachelor's degree or higher in Attack Surface Management, Information Security, Information Technology, Computer Science, Math, or any other related area
  • 3-7 years of experience working in information technology vulnerability management, information security, incident response, red team operations, application security, reverse engineering, or other technical cyber security roles
  • Certified Information Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent
  • Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.
  • Understanding of common network infrastructure devices such as routers and switches
  • Understanding of basic networking protocols such as TCP/IP, DNS, HTTP
  • Understanding of vulnerability classification using National Vulnerability Database nomenclature such as CVE/CVSS
  • Basic knowledge in system security architecture and security solutions

Preferred:

  • Proven ability to translate complex information sets into specific recommendations that can be actioned by customers to enhance their security posture
  • Familiarity with cyber threats, defenses, motivations, and techniques
  • Experience with vulnerability analysis tools such as Qualys or Tenable, and the asset provisioning/deprovisioning lifecycle
  • Patch management skills and technology application such as Microsoft System Center Configuration Manager (SCCM)
  • Experience distilling raw information into actionable intelligence
  • Outstanding English written and oral communication skills and the ability to prioritize work
  • Strong understanding of threat analysis and enterprise level, mitigation strategies
  • Working knowledge of how malicious code operates and how technical vulnerabilities are exploited
  • Strong knowledge of operating systems and networking technologies in general
  • Strong knowledge of databases, query design, and how to analyze data thus obtained
  • Knowledge of supporting toolsets such as Confluence, Jira, and Configuration Management Databases (CMDB) such as ServiceNow
  • Strong analytical and problem-solving skills
  • Self-motivated to improve knowledge and skills
  • A strong desire to understand the what as well as the why and the how of security incidents

Primary skills

vulnerability & assessment management

VM implementation

CIS Baseline

tools like rapid 7

enable , qualys guard ( certifications are added advantage ) Certifications – CISSP ( Certified information system security professional ) – good to have Client facing role

Apply Now