S T M TECHNOLOGIES

Security Operations Vulnerability Specialist - SIEM

Job Location

bangalore, India

Job Description

Responsibilities : - Conduct regular and comprehensive vulnerability assessments and penetration testing activities on our network infrastructure, systems, and applications. - Analyze vulnerability scan results from various scanning tools (e.g., Nessus, Qualys, Rapid7) to identify and prioritize security weaknesses based on severity and potential impact. - Manage and track the lifecycle of identified vulnerabilities, from discovery through remediation and verification. - Develop and maintain vulnerability management policies, procedures, and standards in alignment with industry best practices and regulatory requirements. - Collaborate closely with IT operations, development teams, and other stakeholders to communicate vulnerability findings and facilitate the timely implementation of security patches and configuration changes. - Monitor security advisories, threat intelligence feeds, and vendor notifications to stay informed about emerging vulnerabilities and potential threats. - Generate clear and concise reports on vulnerability status, trends, and remediation efforts for both technical and management audiences. - Participate in incident response activities, particularly those related to the exploitation of identified vulnerabilities, providing technical expertise and support. - Contribute to the continuous improvement of the vulnerability management program by identifying areas for optimization and implementing enhancements. - Stay up-to-date with the latest security threats, vulnerabilities, attack techniques, and mitigation strategies. - Assist in the selection, implementation, and management of vulnerability scanning and management tools. - Provide guidance and training to other team members on vulnerability management best Skills : - Vulnerability Scanning Tools : Extensive hands-on experience (5 years) with enterprise-grade vulnerability scanning tools such as Nessus, Qualys, Rapid7 InsightVM, or similar. Ability to configure scans, analyze results, and generate reports. - Penetration Testing Tools and Methodologies : Familiarity with penetration testing tools (e.g., Metasploit Framework, Burp Suite, OWASP ZAP) and methodologies (e.g., OWASP Testing Guide, PTES). - Operating Systems : Strong knowledge of various operating systems, including Windows Server, Linux distributions (e.g., CentOS, Ubuntu), and macOS, with a focus on security configurations and hardening. - Networking : Solid understanding of network protocols (TCP/IP, DNS, HTTP/S, etc.), network security concepts (firewalls, intrusion detection/prevention systems), and network vulnerability assessment techniques. - Security Concepts and Frameworks : Deep understanding of common security vulnerabilities (e.g., OWASP Top 10, SANS Top 25), attack vectors, and security frameworks (e.g., NIST CSF, ISO 27001). - Scripting Languages : Proficiency in at least one scripting language such as Python, Bash, or PowerShell for automating tasks, analyzing data, and developing custom security tools. - Security Information and Event Management (SIEM) : Experience with SIEM systems (e.g., Splunk, ELK Stack, Azure Sentinel) for log analysis, correlation of security events, and identifying potential indicators of compromise. - Patch Management : Thorough understanding of patch management processes, tools, and best practices for various operating systems and applications. - Cloud Security (Beneficial) : Familiarity with security concepts and vulnerability management in cloud environments such as AWS, Azure, or Google Cloud Platform. - Container Security (Beneficial) : Basic understanding of containerization technologies (e.g., Docker, Kubernetes) and related security : - Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field. - 6-8 years of progressive experience in vulnerability management, security operations, or a related cybersecurity role. - Proven experience in conducting vulnerability assessments and analyzing scan results. - Strong technical understanding of security vulnerabilities, exploitation techniques, and remediation strategies. - Excellent analytical and problem-solving skills with the ability to prioritize and manage risks effectively. - Good verbal and written communication skills, with the ability to clearly articulate technical findings to both technical and non-technical audiences. - Ability to work independently and collaboratively within a team environment. - Strong attention to detail and a proactive approach to Points : - Relevant security certifications such as OSCP (Offensive Security Certified Professional), CISSP (Certified Information Systems Security Professional), CEH (Certified Ethical Hacker), CompTIA Security, or GIAC certifications (e.g., GPEN, GWAPT). - Experience with threat intelligence platforms and the ability to leverage threat intelligence for proactive vulnerability management. - Experience with automation tools and scripting for automating vulnerability scanning, analysis, and reporting tasks. - Knowledge of regulatory compliance standards relevant to security and data protection (e.g., PCI DSS, HIPAA, GDPR). - Experience with bug bounty programs and vulnerability disclosure processes. (ref:hirist.tech)

Location: bangalore, IN

Posted Date: 4/18/2025
View More S T M TECHNOLOGIES Jobs

Contact Information

Contact Human Resources
S T M TECHNOLOGIES

Posted

April 18, 2025
UID: 5143720801

AboutJobs.com does not guarantee the validity or accuracy of the job information posted in this database. It is the job seeker's responsibility to independently review all posting companies, contracts and job offers.