hireejobs
Hyderabad Jobs
Banglore Jobs
Chennai Jobs
Delhi Jobs
Ahmedabad Jobs
Mumbai Jobs
Pune Jobs
Vijayawada Jobs
Gurgaon Jobs
Noida Jobs
Oil & Gas Jobs
Banking Jobs
Construction Jobs
Top Management Jobs
IT - Software Jobs
Medical Healthcare Jobs
Purchase / Logistics Jobs
Sales
Ajax Jobs
Designing Jobs
ASP .NET Jobs
Java Jobs
MySQL Jobs
Sap hr Jobs
Software Testing Jobs
Html Jobs
IT Jobs
Logistics Jobs
Customer Service Jobs
Airport Jobs
Banking Jobs
Driver Jobs
Part Time Jobs
Civil Engineering Jobs
Accountant Jobs
Safety Officer Jobs
Nursing Jobs
Civil Engineering Jobs
Hospitality Jobs
Part Time Jobs
Security Jobs
Finance Jobs
Marketing Jobs
Shipping Jobs
Real Estate Jobs
Telecom Jobs

Threat & Vulnerability Management () -

6.00 to 7.00 Years   Chennai, Hyderabad, Kolkata   26 Jun, 2022
Job LocationChennai, Hyderabad, Kolkata
EducationNot Mentioned
SalaryNot Disclosed
IndustryIT - Software
Functional AreaGeneral / Other Software
EmploymentTypeFull-time

Job Description

    Role Summary The Threat & Vulnerability Management team is responsible for protecting critical Cognizant Infrastructure from Security Vulnerabilities by tracking the remediation activities with asset owners and ensuring that appropriate mitigation is in place. This role will closely work with various teams responsible for mitigating the identified vulnerabilities with due concurrence of the respective business owners and stakeholders. Responsibilities Activities include, but are not limited to the following: Have a broad understanding of the current cyber security landscape, with a background in vulnerability management Must have hands on experience of security scanning tools and techniques; Ability to identify false positives manually is a plus Experience in analysis of vulnerability results and recommending corrective action Ability to investigate on latest security related vulnerabilities to ensure infrastructure security posture is strong Facilitate and coordinate vulnerability assessment, reviews of assessment results, patching, and remediation activities related to BU OS, Middleware, Servers, Storage, Databases, Appliances, Web Applications and Network Devices Collaborate on Information Security policies, standards, and baselines and contribute efforts to measure compliance Ability to define and report vulnerability metrics to drive remediation trends Report on findings and advise stakeholders in remediation activities as required Document all processes and procedures in accordance with Cognizants Reporting Standards Understand the Scope of Work for the engagement and perform the duties and tasks required by those agreements in an organized, professional manner Ability to solve complex technical problems and articulate to non-IT personnel Research and develop testing tools, techniques, and process improvements Strong understanding of various networking, servers and web technologies and testing methodologies Experience with cloud hosted environments is a plus Knowledge of any one or more Scripting Languages such as Perl, Python, Ruby etc. is a plus Demonstrates an ability to methodically analyze problems, identify solutions, and communicate to a non-technical audience Exhibits good writing and communications skills, to include the ability to render concise reports, summaries, and formal oral presentations. Self-motivated and able to work both independently and with a team. Tool Knowledge The candidate must possess knowledge of industry-recognized security tools including the following: NMAP Acunetix Burp Qualys Guard VA Qualys Cloud Agent Sys Internal Tools Tenable Nessus Microsoft SCCM Tanium Education and Experience Requirements: Candidate must have sufficient information security knowledge and experience to conduct technically complex Security Assessments. He or She must have a Bachelors degree in Computer Science, Cyber Security or the equivalent from a recognized university He or she must have around 6 to 7 years of relevant information security experience with proof of work experience and Security Certifications. Possess industry-recognized security certification(s) including one or more of the following: o Certified Ethical Hacker (CEH) o EC-Council Certified Security Analyst (ECSA) o Licensed Penetration Tester (LPT) ,

Keyskills :
certified ethical hackerenvironmental impact assessmenttesting toolscyber securitysecurity toolscomputer scienceweb technologiesweb applicationssecurity analysis

Threat & Vulnerability Management () - Related Jobs

© 2019 Hireejobs All Rights Reserved