Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Security Specialist Vulnerability Management.
India Jobs Expertini

Urgent! Security Specialist - Vulnerability Management Job Opening In Chennai – Now Hiring Lennox

Security Specialist Vulnerability Management



Job description

Job Description

  • Hands-on experience working with Vulnerability assessment tools like Nexpose, Nessus & vulnerability response (ServiceNow)
  • Perform information system security vulnerability scanning to discover and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system components.
  • Perform compliance scanning to analyze configurations and facilitate implementation of configurations and hardening settings for networks, operating systems, applications, databases, and other information system components.
  • Maintaining appropriate documentation that defines the Threat & Vulnerability Management Program, Policy and Procedures
  • Participated in the calls to resolve information security incidents, including internal events and targeted threats.
  • Research, evaluate, and assess emerging cyber security threats, incidents, and vulnerabilities.
  • Work with the stakeholders to develop and maintain a vulnerability intelligence process that monitors for emerging systems vulnerabilities.
  • Prioritize the remediation of vulnerabilities based on their characteristics, such as threat intelligence, business criticality, and exploit maturity.
  • Define minimum standards in relation to threat management and monitoring compliance across the businesses.
  • Take responsibility for scheduling, detecting, and analyzing vulnerabilities and vulnerability-related activity affecting the organization domain.
  • Help create prioritized overviews of cyber vulnerabilities by putting them in the context of IT services and business applications, leading to remediation actions by the respective parties.
  • Conduct deep-dive analysis on attacks and share actionable data with partner teams.
  • Ensure the accurate and timely release of vulnerability metrics.
  • Report on areas of non-compliance against Policy and/or Group Standards
  • Qualifications

  • Good knowledge of security monitoring approaches, techniques, and widely used products to seek out security threats and improve an organization’s security posture.
  • Experience with threat and vulnerability management and other security operations processes and techniques (such as identity management, cryptography, patch management, etc.).

    Knowledge of threats to widely used digital and technology systems, including on-prem and cloud-based solutions.
  • Interprets device and application logs from various sources (i.e., Firewalls, Proxies, Web Servers, System Logs, Splunk, Packet Captures, etc.) to identify anomalies or evidence of compromise.
  • Experience defining a Threat and Vulnerability Management solution using tools such as Tenable.io/Rapid 7/Nessus/Vulnerability Response (ServiceNow)/Azure Threat management platform/Other Cloud Security Technologies.
  • Minimum seven plus years of Experience working within a Security Operations Centre or Incident Response Team, Law Enforcement.
  • Use of threat intelligence to identify potential threats, assess their impact, and provide actionable insights to the organization.
  • Certification in vulnerability management related to Nessus, Nexpose & ServiceNow Vulnerability response.
  • Any Certification in CEH, CompTIA PenTest+, Certified Penetration Tester (CPT), Certified Cloud Penetration Tester (CCPT) etc.
  • A broad background in information security with experience in security operations, vulnerabilities and exploitation, network security, and cloud security
  • Relevant experience in cybersecurity architecture, engineering, and/or SOC work experience (monitoring, detection, incident response, forensics)
  • Monitoring for emerging threat patterns and vulnerabilities
  • Vulnerability Scheduling, monitoring & troubleshooting the tools we manage.
  • Threat Report Generation based on the stakeholder's requirements.

  • Required Skill Profession

    Computer Occupations



    Your Complete Job Search Toolkit

    ✨ Smart • Intelligent • Private • Secure

    Start Using Our Tools

    Join thousands of professionals who've advanced their careers with our platform

    Rate or Report This Job
    If you feel this job is inaccurate or spam kindly report to us using below form.
    Please Note: This is NOT a job application form.


      Unlock Your Security Specialist Potential: Insight & Career Growth Guide