Conduct regular vulnerability scans and assessments using automated tools and manual techniques to identify security weaknesses in systems, networks, and applications.
Analyze scan results and prioritize vulnerabilities based on severity, exploitability, and potential impact on business operations.
Evaluate the risk associated with identified vulnerabilities, considering factors such as the likelihood of exploitation and the potential impact on confidentiality, integrity, and availability.
Collaborate with stakeholders to establish risk tolerance levels and prioritize remediation efforts accordingly.
Coordinate with system owners, IT teams, and third-party vendors to ensure timely remediation of identified vulnerabilities.
Provide guidance and support to technical teams on effective mitigation strategies and best practices for patch management.
Generate comprehensive reports on vulnerability assessment findings, including trends, progress, and remediation status.
Communicate vulnerability risks and recommendations to technical and non-technical stakeholders, including management and system owners.
Identify opportunities to enhance the vulnerability management program through automation, process optimization, and the adoption of industry best practices.
Stay current with emerging threats, attack techniques, and vulnerability trends to adapt and improve vulnerability management strategies.
Qualifications :
Bachelors degree in Computer Science, Information Security, or related field (or equivalent experience).
Solid understanding of cybersecurity principles, vulnerability assessment methodologies, and common vulnerabilities (e.g., OWASP Top 10).
Experience with vulnerability scanning tools such as Nessus, Qualys, or OpenVAS.
Familiarity with common network protocols, operating systems, and web applications.
Strong analytical and problem-solving skills, with the ability to prioritize and manage multiple tasks in a dynamic environment.
Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or equivalent are preferred.
Experience with scripting and automation tools (e.g., Python, PowerShell) for vulnerability management tasks is a plus.
Knowledge of regulatory compliance requirements (e.g.,ISO, GDPR) related to vulnerability management is advantageous.