drjobs Infrastructure Vulnerability Mgmt - ASM العربية

Infrastructure Vulnerability Mgmt - ASM

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Jobs by Experience drjobs

5years

Job Location drjobs

Hyderabad - India

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Do you love a career where you Experience Grow & Contribute at the same time while earning at least 10% above the market If so we are excited to have bumped onto you.


We are an IT Solutions Integrator/Consulting Firm helping our clients hire the right professional for an exciting long term project. Here are a few details.







Requirements

  • Hold a Bachelors degree or higher in fields like Attack Surface Management Information Security Information Technology Computer Science Mathematics or related areas.
  • Accumulate 37 years of experience across various technical cyber security roles such as information technology vulnerability management incident response red team operations or application security.
  • Possess certifications like Certified Information Systems Security Professional (CISSP) Certified Intrusion Analyst (GIAC) Continuous Monitoring (GMON) Certified Ethical Hacker (CEH) or equivalent.
  • Familiarity with potential attack activities like network probing/scanning DDOS and malicious code activity.
  • Understanding of common network infrastructure devices such as routers and switches.
  • Familiarity with basic networking protocols such as TCP/IP DNS and HTTP.
  • Knowledge of vulnerability classification using National Vulnerability Database nomenclature like CVE/CVSS.
  • Basic understanding of system security architecture and security solutions.
Preferred Qualifications:
  • Demonstrated ability to translate complex information into actionable recommendations for enhancing security posture.
  • Familiarity with cyber threats defenses motivations and techniques.
  • Experience with vulnerability analysis tools like Qualys or Tenable and the asset provisioning/deprovisioning lifecycle.
  • Proficiency in patch management skills and technology application such as Microsoft System Center Configuration Manager (SCCM).
  • Ability to distill raw information into actionable intelligence.
  • Excellent written and oral communication skills in English and adept at prioritizing tasks.
  • Strong grasp of threat analysis and enterpriselevel mitigation strategies.
  • Knowledge of how malicious code operates and exploits technical vulnerabilities.
  • Deep understanding of operating systems and networking technologies.
  • Proficiency in databases query design and data analysis.
  • Familiarity with supporting tools such as Confluence Jira and Configuration Management Databases (CMDB) like ServiceNow.
  • Strong analytical and problemsolving abilities.
  • Selfmotivated to enhance knowledge and skills.
  • Inquisitive mindset to understand the what why and how of security incidents.


Benefits



Hold a Bachelor's degree or higher in fields like Attack Surface Management, Information Security, Information Technology, Computer Science, Mathematics, or related areas. Accumulate 3-7 years of experience across various technical cyber security roles such as information technology vulnerability management, incident response, red team operations, or application security. Possess certifications like Certified Information Systems Security Professional (CISSP), Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH), or equivalent. Familiarity with potential attack activities like network probing/scanning, DDOS, and malicious code activity. Understanding of common network infrastructure devices such as routers and switches. Familiarity with basic networking protocols such as TCP/IP, DNS, and HTTP. Knowledge of vulnerability classification using National Vulnerability Database nomenclature like CVE/CVSS. Basic understanding of system security architecture and security solutions. Preferred Qualifications: Demonstrated ability to translate complex information into actionable recommendations for enhancing security posture. Familiarity with cyber threats, defenses, motivations, and techniques. Experience with vulnerability analysis tools like Qualys or Tenable and the asset provisioning/deprovisioning lifecycle. Proficiency in patch management skills and technology application such as Microsoft System Center Configuration Manager (SCCM). Ability to distill raw information into actionable intelligence. Excellent written and oral communication skills in English and adept at prioritizing tasks. Strong grasp of threat analysis and enterprise-level mitigation strategies. Knowledge of how malicious code operates and exploits technical vulnerabilities. Deep understanding of operating systems and networking technologies. Proficiency in databases, query design, and data analysis. Familiarity with supporting tools such as Confluence, Jira, and Configuration Management Databases (CMDB) like ServiceNow. Strong analytical and problem-solving abilities. Self-motivated to enhance knowledge and skills. Inquisitive mindset to understand the 'what,' 'why,' and 'how' of security incidents.

Employment Type

Full Time

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.