
Eaton Technologies Private Limited•2h ago
Foundit
Analyst
Pune
Full Time
Mid Level
Full Job Description
Pune, India - Vulnerability Management Analyst at Eaton Technologies Private Limited
Join Eaton Technologies Private Limited in Pune as a Security Analyst specializing in Vulnerability Management. This pivotal role involves working within a dedicated team to identify, track, and ensure the successful remediation of vulnerabilities across internal and external applications and systems. You will conduct in-depth analysis of security weaknesses, leverage vulnerability scanning tools, and foster collaborative relationships with various IT departments.
Key Responsibilities:
- Monitor applications, endpoints, databases, networking devices, and mobile/cloud services for emerging vulnerabilities.
- Perform continuous discovery, vulnerability assessments, and track remediation progress for enterprise-wide assets.
- Provide expert guidance to remediation teams on effective reduction and mitigation strategies.
- Analyze vulnerability data to detect critical trends, patterns, and potential risks.
- Generate regular reports on the vulnerability landscape, detailing criticality, exploit probability, business impact, and recommended remediation approaches.
- Act as a primary point of contact for new and ongoing vulnerability-related inquiries and incidents.
- Deliver essential vulnerability education and guidance to stakeholders, developers, IT leadership, and business executives.
- Maintain comprehensive documentation for vulnerability management policies and procedures.
- Undertake additional duties as assigned to support the security team's objectives.
Qualifications:
- Bachelor's degree in a relevant technical field.
- 3-5 years of experience in security operations, vulnerability management, or IT operations.
Required Skills:
- Demonstrated ability to analyze and understand vulnerabilities and their associated exploits.
- Proficiency with both commercial and open-source vulnerability management solutions.
- Solid understanding of Tactics, Techniques, and Procedures (TTPs), the MITRE ATT&CK framework, Common Vulnerability Scoring System (CVSS), Open Source Intelligence (OSINT), and deception techniques.
- Knowledge of operating systems, applications, infrastructure, and cloud computing services.
- Familiarity with OWASP, CVSS, the MITRE ATT&CK framework, and the software development lifecycle.
- Capability to understand complex technical infrastructure, managed services, and third-party dependencies.
- Preferred experience with vulnerability management across AWS, Azure, or Google Cloud Platform.
- Experience in threat hunting, adversary emulation, or red teaming exercises is a significant advantage.
- Excellent communication skills, with the ability to engage effectively across all organizational levels.
- Strong project management, multitasking, and organizational abilities.
Company
Eaton Technologies Private Limited
Pune
Posted on Foundit