drjobs Infrastructure Vulnerability Mgmt - ASM English

Infrastructure Vulnerability Mgmt - ASM

صاحب العمل نشط

1 وظيفة شاغرة
drjobs

حالة تأهب وظيفة

سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكتروني
Valid email field required
أرسل الوظائف
drjobs
أرسل لي وظائف مشابهة
drjobs

حالة تأهب وظيفة

سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكتروني

Valid email field required
أرسل الوظائف
الخبرة drjobs

5سنوات

موقع الوظيفة drjobs

حيدر آباد - الهند

الراتب الشهري drjobs

لم يكشف

drjobs

لم يتم الكشف عن الراتب

عدد الوظائف الشاغرة

1 وظيفة شاغرة

الوصف الوظيفي

Do you love a career where you Experience Grow & Contribute at the same time while earning at least 10% above the market If so we are excited to have bumped onto you.


We are an IT Solutions Integrator/Consulting Firm helping our clients hire the right professional for an exciting long term project. Here are a few details.







Requirements

  • Hold a Bachelors degree or higher in fields like Attack Surface Management Information Security Information Technology Computer Science Mathematics or related areas.
  • Accumulate 37 years of experience across various technical cyber security roles such as information technology vulnerability management incident response red team operations or application security.
  • Possess certifications like Certified Information Systems Security Professional (CISSP) Certified Intrusion Analyst (GIAC) Continuous Monitoring (GMON) Certified Ethical Hacker (CEH) or equivalent.
  • Familiarity with potential attack activities like network probing/scanning DDOS and malicious code activity.
  • Understanding of common network infrastructure devices such as routers and switches.
  • Familiarity with basic networking protocols such as TCP/IP DNS and HTTP.
  • Knowledge of vulnerability classification using National Vulnerability Database nomenclature like CVE/CVSS.
  • Basic understanding of system security architecture and security solutions.
Preferred Qualifications:
  • Demonstrated ability to translate complex information into actionable recommendations for enhancing security posture.
  • Familiarity with cyber threats defenses motivations and techniques.
  • Experience with vulnerability analysis tools like Qualys or Tenable and the asset provisioning/deprovisioning lifecycle.
  • Proficiency in patch management skills and technology application such as Microsoft System Center Configuration Manager (SCCM).
  • Ability to distill raw information into actionable intelligence.
  • Excellent written and oral communication skills in English and adept at prioritizing tasks.
  • Strong grasp of threat analysis and enterpriselevel mitigation strategies.
  • Knowledge of how malicious code operates and exploits technical vulnerabilities.
  • Deep understanding of operating systems and networking technologies.
  • Proficiency in databases query design and data analysis.
  • Familiarity with supporting tools such as Confluence Jira and Configuration Management Databases (CMDB) like ServiceNow.
  • Strong analytical and problemsolving abilities.
  • Selfmotivated to enhance knowledge and skills.
  • Inquisitive mindset to understand the what why and how of security incidents.


Benefits



Hold a Bachelor's degree or higher in fields like Attack Surface Management, Information Security, Information Technology, Computer Science, Mathematics, or related areas. Accumulate 3-7 years of experience across various technical cyber security roles such as information technology vulnerability management, incident response, red team operations, or application security. Possess certifications like Certified Information Systems Security Professional (CISSP), Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH), or equivalent. Familiarity with potential attack activities like network probing/scanning, DDOS, and malicious code activity. Understanding of common network infrastructure devices such as routers and switches. Familiarity with basic networking protocols such as TCP/IP, DNS, and HTTP. Knowledge of vulnerability classification using National Vulnerability Database nomenclature like CVE/CVSS. Basic understanding of system security architecture and security solutions. Preferred Qualifications: Demonstrated ability to translate complex information into actionable recommendations for enhancing security posture. Familiarity with cyber threats, defenses, motivations, and techniques. Experience with vulnerability analysis tools like Qualys or Tenable and the asset provisioning/deprovisioning lifecycle. Proficiency in patch management skills and technology application such as Microsoft System Center Configuration Manager (SCCM). Ability to distill raw information into actionable intelligence. Excellent written and oral communication skills in English and adept at prioritizing tasks. Strong grasp of threat analysis and enterprise-level mitigation strategies. Knowledge of how malicious code operates and exploits technical vulnerabilities. Deep understanding of operating systems and networking technologies. Proficiency in databases, query design, and data analysis. Familiarity with supporting tools such as Confluence, Jira, and Configuration Management Databases (CMDB) like ServiceNow. Strong analytical and problem-solving abilities. Self-motivated to enhance knowledge and skills. Inquisitive mindset to understand the 'what,' 'why,' and 'how' of security incidents.

نوع التوظيف

دوام كامل

نبذة عن الشركة

الإبلاغ عن هذه الوظيفة
إخلاء المسؤولية: د.جوب هو مجرد منصة تربط بين الباحثين عن عمل وأصحاب العمل. ننصح المتقدمين بإجراء بحث مستقل خاص بهم في أوراق اعتماد صاحب العمل المحتمل. نحن نحرص على ألا يتم طلب أي مدفوعات مالية من قبل عملائنا، وبالتالي فإننا ننصح بعدم مشاركة أي معلومات شخصية أو متعلقة بالحسابات المصرفية مع أي طرف ثالث. إذا كنت تشك في وقوع أي احتيال أو سوء تصرف، فيرجى التواصل معنا من خلال تعبئة النموذج الموجود على الصفحة اتصل بنا