Do you love a career where you Experience Grow & Contribute at the same time while earning at least 10% above the market If so we are excited to have bumped onto you.
If you are a Infrastructure Vulnerability Mgmt. ASM and looking for excitement challenge and stability in your work then you would be glad to come across this page.
We are an IT Solutions Integrator/Consulting Firm helping our clients hire the right professional for an exciting long term project. Here are a few details.
Check if you are up for maximizing your earning/growth potential leveraging our Disruptive Talent Solution.
Role: Infrastructure Vulnerability Mgmt. ASM
Location: Hyderabad Bangalore Pune
Hybrid Mode Position
Exp: 5 Years
Responsibilities:
In the role of Senior Consultant for Attack Surface Management your duties will revolve around aiding clients in identifying vulnerabilities and unauthorized assets within their networks. This entails collaborating with a global team of engineers and analysts who specialize in understanding the tactics tools and procedures employed by cybercriminals.
- Customize and execute vulnerability scans to identify weaknesses within both internal and external networks.
- Evaluate enrich and prioritize specific actions aimed at addressing identified vulnerabilities such as deploying patches or enhancing configurations.
- Contribute to creating a comprehensive operational overview and enhancing cyber security situational awareness.
- Utilize various vulnerability threat feeds assessment tools asset inventory tools and reporting frameworks to correlate assets with identified vulnerabilities and generate reports.
- Address requests for adhoc reporting and research topics from management and analysts as needed.
- Identify deficiencies in available asset information and collaborate with leadership to develop strategies for meeting servicelevel requirements through effective collaboration with remediation partners.
- Quickly grasp and fulfill company and client requirements.
- Assist in and participate in regular reporting activities for clients partners and internal teams.
- Adhere to internal operational security protocols and policies.
Requirements
- Hold a Bachelors degree or higher in fields like Attack Surface Management Information Security Information Technology Computer Science Mathematics or related areas.
- Accumulate 37 years of experience across various technical cyber security roles such as information technology vulnerability management incident response red team operations or application security.
- Possess certifications like Certified Information Systems Security Professional (CISSP) Certified Intrusion Analyst (GIAC) Continuous Monitoring (GMON) Certified Ethical Hacker (CEH) or equivalent.
- Familiarity with potential attack activities like network probing/scanning DDOS and malicious code activity.
- Understanding of common network infrastructure devices such as routers and switches.
- Familiarity with basic networking protocols such as TCP/IP DNS and HTTP.
- Knowledge of vulnerability classification using National Vulnerability Database nomenclature like CVE/CVSS.
- Basic understanding of system security architecture and security solutions.
Preferred Qualifications:
- Demonstrated ability to translate complex information into actionable recommendations for enhancing security posture.
- Familiarity with cyber threats defenses motivations and techniques.
- Experience with vulnerability analysis tools like Qualys or Tenable and the asset provisioning/deprovisioning lifecycle.
- Proficiency in patch management skills and technology application such as Microsoft System Center Configuration Manager (SCCM).
- Ability to distill raw information into actionable intelligence.
- Excellent written and oral communication skills in English and adept at prioritizing tasks.
- Strong grasp of threat analysis and enterpriselevel mitigation strategies.
- Knowledge of how malicious code operates and exploits technical vulnerabilities.
- Deep understanding of operating systems and networking technologies.
- Proficiency in databases query design and data analysis.
- Familiarity with supporting tools such as Confluence Jira and Configuration Management Databases (CMDB) like ServiceNow.
- Strong analytical and problemsolving abilities.
- Selfmotivated to enhance knowledge and skills.
- Inquisitive mindset to understand the what why and how of security incidents.
Benefits
Hold a Bachelor's degree or higher in fields like Attack Surface Management, Information Security, Information Technology, Computer Science, Mathematics, or related areas. Accumulate 3-7 years of experience across various technical cyber security roles such as information technology vulnerability management, incident response, red team operations, or application security. Possess certifications like Certified Information Systems Security Professional (CISSP), Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH), or equivalent. Familiarity with potential attack activities like network probing/scanning, DDOS, and malicious code activity. Understanding of common network infrastructure devices such as routers and switches. Familiarity with basic networking protocols such as TCP/IP, DNS, and HTTP. Knowledge of vulnerability classification using National Vulnerability Database nomenclature like CVE/CVSS. Basic understanding of system security architecture and security solutions. Preferred Qualifications: Demonstrated ability to translate complex information into actionable recommendations for enhancing security posture. Familiarity with cyber threats, defenses, motivations, and techniques. Experience with vulnerability analysis tools like Qualys or Tenable and the asset provisioning/deprovisioning lifecycle. Proficiency in patch management skills and technology application such as Microsoft System Center Configuration Manager (SCCM). Ability to distill raw information into actionable intelligence. Excellent written and oral communication skills in English and adept at prioritizing tasks. Strong grasp of threat analysis and enterprise-level mitigation strategies. Knowledge of how malicious code operates and exploits technical vulnerabilities. Deep understanding of operating systems and networking technologies. Proficiency in databases, query design, and data analysis. Familiarity with supporting tools such as Confluence, Jira, and Configuration Management Databases (CMDB) like ServiceNow. Strong analytical and problem-solving abilities. Self-motivated to enhance knowledge and skills. Inquisitive mindset to understand the 'what,' 'why,' and 'how' of security incidents.