S T M TECHNOLOGIES
Security Operations Vulnerability Specialist - SIEM
Job Location
bangalore, India
Job Description
Responsibilities : - Conduct regular and comprehensive vulnerability assessments and penetration testing activities on our network infrastructure, systems, and applications. - Analyze vulnerability scan results from various scanning tools (e.g., Nessus, Qualys, Rapid7) to identify and prioritize security weaknesses based on severity and potential impact. - Manage and track the lifecycle of identified vulnerabilities, from discovery through remediation and verification. - Develop and maintain vulnerability management policies, procedures, and standards in alignment with industry best practices and regulatory requirements. - Collaborate closely with IT operations, development teams, and other stakeholders to communicate vulnerability findings and facilitate the timely implementation of security patches and configuration changes. - Monitor security advisories, threat intelligence feeds, and vendor notifications to stay informed about emerging vulnerabilities and potential threats. - Generate clear and concise reports on vulnerability status, trends, and remediation efforts for both technical and management audiences. - Participate in incident response activities, particularly those related to the exploitation of identified vulnerabilities, providing technical expertise and support. - Contribute to the continuous improvement of the vulnerability management program by identifying areas for optimization and implementing enhancements. - Stay up-to-date with the latest security threats, vulnerabilities, attack techniques, and mitigation strategies. - Assist in the selection, implementation, and management of vulnerability scanning and management tools. - Provide guidance and training to other team members on vulnerability management best Skills : - Vulnerability Scanning Tools : Extensive hands-on experience (5 years) with enterprise-grade vulnerability scanning tools such as Nessus, Qualys, Rapid7 InsightVM, or similar. Ability to configure scans, analyze results, and generate reports. - Penetration Testing Tools and Methodologies : Familiarity with penetration testing tools (e.g., Metasploit Framework, Burp Suite, OWASP ZAP) and methodologies (e.g., OWASP Testing Guide, PTES). - Operating Systems : Strong knowledge of various operating systems, including Windows Server, Linux distributions (e.g., CentOS, Ubuntu), and macOS, with a focus on security configurations and hardening. - Networking : Solid understanding of network protocols (TCP/IP, DNS, HTTP/S, etc.), network security concepts (firewalls, intrusion detection/prevention systems), and network vulnerability assessment techniques. - Security Concepts and Frameworks : Deep understanding of common security vulnerabilities (e.g., OWASP Top 10, SANS Top 25), attack vectors, and security frameworks (e.g., NIST CSF, ISO 27001). - Scripting Languages : Proficiency in at least one scripting language such as Python, Bash, or PowerShell for automating tasks, analyzing data, and developing custom security tools. - Security Information and Event Management (SIEM) : Experience with SIEM systems (e.g., Splunk, ELK Stack, Azure Sentinel) for log analysis, correlation of security events, and identifying potential indicators of compromise. - Patch Management : Thorough understanding of patch management processes, tools, and best practices for various operating systems and applications. - Cloud Security (Beneficial) : Familiarity with security concepts and vulnerability management in cloud environments such as AWS, Azure, or Google Cloud Platform. - Container Security (Beneficial) : Basic understanding of containerization technologies (e.g., Docker, Kubernetes) and related security : - Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field. - 6-8 years of progressive experience in vulnerability management, security operations, or a related cybersecurity role. - Proven experience in conducting vulnerability assessments and analyzing scan results. - Strong technical understanding of security vulnerabilities, exploitation techniques, and remediation strategies. - Excellent analytical and problem-solving skills with the ability to prioritize and manage risks effectively. - Good verbal and written communication skills, with the ability to clearly articulate technical findings to both technical and non-technical audiences. - Ability to work independently and collaboratively within a team environment. - Strong attention to detail and a proactive approach to Points : - Relevant security certifications such as OSCP (Offensive Security Certified Professional), CISSP (Certified Information Systems Security Professional), CEH (Certified Ethical Hacker), CompTIA Security, or GIAC certifications (e.g., GPEN, GWAPT). - Experience with threat intelligence platforms and the ability to leverage threat intelligence for proactive vulnerability management. - Experience with automation tools and scripting for automating vulnerability scanning, analysis, and reporting tasks. - Knowledge of regulatory compliance standards relevant to security and data protection (e.g., PCI DSS, HIPAA, GDPR). - Experience with bug bounty programs and vulnerability disclosure processes. (ref:hirist.tech)
Location: bangalore, IN
Posted Date: 4/18/2025
Location: bangalore, IN
Posted Date: 4/18/2025
Contact Information
Contact | Human Resources S T M TECHNOLOGIES |
---|