hireejobs
Hyderabad Jobs
Banglore Jobs
Chennai Jobs
Delhi Jobs
Ahmedabad Jobs
Mumbai Jobs
Pune Jobs
Vijayawada Jobs
Gurgaon Jobs
Noida Jobs
Oil & Gas Jobs
Banking Jobs
Construction Jobs
Top Management Jobs
IT - Software Jobs
Medical Healthcare Jobs
Purchase / Logistics Jobs
Sales
Ajax Jobs
Designing Jobs
ASP .NET Jobs
Java Jobs
MySQL Jobs
Sap hr Jobs
Software Testing Jobs
Html Jobs
IT Jobs
Logistics Jobs
Customer Service Jobs
Airport Jobs
Banking Jobs
Driver Jobs
Part Time Jobs
Civil Engineering Jobs
Accountant Jobs
Safety Officer Jobs
Nursing Jobs
Civil Engineering Jobs
Hospitality Jobs
Part Time Jobs
Security Jobs
Finance Jobs
Marketing Jobs
Shipping Jobs
Real Estate Jobs
Telecom Jobs

Full time opportunity for IT infra- Vulnerability Management -Cyber Security

6.00 to 11.00 Years   Chennai,Bangalore, Noida, Hyderabad, Pune   10 Oct, 2024
Job LocationChennai,Bangalore, Noida, Hyderabad, Pune
EducationNot Mentioned
SalaryNot Disclosed
IndustryIT Services & Consulting
Functional AreaSecurity ServicesNetworking
EmploymentTypeFull-time

Job Description

    If Interested ,Please reply to hidden_email with updated resume ASAPJD-6 yrs Experience7 PM - 5 AM IST-ShiftSkills & Experience8 - 12 year relevant experiencein vulnerability management and cyber security.
    • Any one Certification -Any Certification in CEH, CompTIA Pen Test, Certified Penetration Tester (CPT), Certified Cloud Penetration Tester (CCPT) etc.
    Mandatory Skills - Must to have
    • Background in information security with experience in security operations, vulnerabilities and exploitation, network security, and cloud security
    • Relevant experience in cybersecurity architecture, engineering, and/or SOC work experience (monitoring, detection, incident response, forensics)
    • Monitoring for emerging threat patterns and vulnerabilities
    • Vulnerability Scheduling, monitoring & troubleshooting the tools we manage.
    • Threat Report Generation based on the stakeholders requirements.
    Security Specialist Vulnerability Management.This position is a part of the Vulnerability Management service acting as the primary support to the lead for the Vulnerability Management team and own identifying, quantifying, and managing cyber vulnerabilities across Organization, in conjunction with other parts of the supportive teams at LII.The role will be responsible for assessing the security vulnerabilities & threats identified by the infrastructure scan. He should work with appropriate teams across the businesses and associated 3rd parties to ensure appropriate remediation plans are defined and implemented.Roles & Responsibilities:
    • Hands-on experience working with Vulnerability assessment tools like Qualys, Nexpose, Nessus & vulnerability response (ServiceNow), Splunk.
    • Perform information system security vulnerability scanning to discover and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system components.
    • Perform compliance scanning to analyze configurations and facilitate implementation of configurations and hardening settings for networks, operating systems, applications, databases, and other information system components.
    • Maintaining appropriate documentation that defines the Threat & Vulnerability Management Program, Policy and Procedures
    • Participated in the calls to resolve information security incidents, including internal events and targeted threats.
    • Research, evaluate, and assess emerging cyber security threats, incidents, and vulnerabilities.
    • Work with the stakeholders to develop and maintain a vulnerability intelligence process that monitors for emerging systems vulnerabilities.
    • Prioritize the remediation of vulnerabilities based on their characteristics, such as threat intelligence, business criticality, and exploit maturity.
    • Define minimum standards in relation to threat management and monitoring compliance across the businesses.
    • Take responsibility for scheduling, detecting, and analyzing vulnerabilities and vulnerability-related activity affecting the organization domain.
    • Help create prioritized overviews of cyber vulnerabilities by putting them in the context of IT services and business applications, leading to remediation actions by the respective parties.
    • Conduct deep-dive analysis on attacks and share actionable data with partner teams.
    • Ensure the accurate and timely release of vulnerability metrics.
    • Report on areas of non-compliance against Policy and/or Group Standards
    Person Specification:Essential
    • Good knowledge of security monitoring approaches, techniques, and widely used products to seek out security threats and improve an organizations security posture.
    • Experience with threat and vulnerability management and other security operations processes and techniques (such as identity management, cryptography, patch management, etc.). Knowledge of threats to widely used digital and technology systems, including on-prem and cloud-based solutions.
    • Interprets device and application logs from various sources (i.e., Splunk, Firewalls, Proxies, Web Servers, System Logs, Packet Captures, etc.) to identify anomalies or evidence of compromise.
    • Experience defining a Threat and Vulnerability Management solution using tools such as Qualys/Tenable.io/Rapid 7/Nessus/Vulnerability Response (ServiceNow)/Azure Threat management platform/Other Cloud Security Technologies.
    • Minimum five to ten plus yearsof Experience working within a Security Operations Centre or Incident Response Team.
    • Use of threat intelligence to identify potential threats, assess their impact, and provide actionable insights to the organization.
    • Certification in vulnerability management related to Nessus, Nexpose & ServiceNow Vulnerability response.
    • Any Certification in CEH, CompTIA PenTest, Certified Penetration Tester (CPT), Certified Cloud Penetration Tester (CCPT) etc.
    Desirable (Technical requirements)
    • A broad background in information security with experience in security operations, vulnerabilities and exploitation, network security, and cloud security
    • Relevant experience in cybersecurity architecture, engineering, and/or SOC work experience (monitoring, detection, incident response, forensics)
    • Monitoring for emerging threat patterns and vulnerabilities
    • Vulnerability Scheduling, monitoring & troubleshooting the tools we manage.
    • Threat Report Generation based on the stakeholders requirements.

Keyskills :
cyber securitysocvulnerability managementvulnerability assessment tools

Full time opportunity for IT infra- Vulnerability Management -Cyber Security Related Jobs

© 2019 Hireejobs All Rights Reserved