Bottom Line
Bottom Line2h ago
Foundit

Vulnerability Management Analyst

Delhi, Kolkata, Mumbai
Mid Level

Auto Apply to 50+ AI Matched Vulnerability Management Analyst Jobs

Use Auto Apply Agents to Bulk Apply jobs with ATS Optimised Resumes, find verified Insider Connections for jobs at Bottom Line

Full Job Description

Vulnerability Management Analyst - Bottom Line

Join Bottom Line as a Vulnerability Management Analyst and play a crucial role in strengthening our cybersecurity posture across Delhi, Kolkata, and Mumbai. This position involves developing and executing comprehensive vulnerability management programs.

Program Development:

  • Support the manager in creating and refining policies, procedures, and reporting standards for vulnerability scanning, assessment, and remediation.
  • Champion best practices in vulnerability management.

Vulnerability Identification and Assessment:

  • Operate and manage leading vulnerability scanning tools to ensure timely and thorough scans of systems, networks, and software.
  • Proactively identify and assess potential security weaknesses.

Remediation Coordination:

  • Efficiently distribute vulnerability reports to key stakeholders responsible for remediation efforts.
  • Track and provide regular progress reports on remediation activities to stakeholders and leadership.

Threat Intelligence Integration:

  • Stay abreast of the latest emerging threats and vulnerabilities by actively monitoring threat intelligence sources.
  • Integrate threat intelligence findings into the vulnerability management process to proactively address high-risk areas and potential threats.

Compliance and Standards:

  • Ensure adherence to regulatory requirements and industry security frameworks, including but not limited to SWIFT, NACHA, PCI, NIST, and GLBA.
  • Prepare for and support internal and external audits related to vulnerability management processes and findings.

Required Experience & Qualifications:

  • Minimum of 3 years of dedicated experience in Cybersecurity.
  • Bachelor's degree in a relevant field.
  • Hands-on experience deploying and operating vulnerability management tools such as Rapid7 and Qualys.
  • Strong foundational knowledge across core cybersecurity domains: Vulnerability Management, External Attack Surface Management, Container Scanning, Cloud Security Compliance scanning, and Security Configuration Management.

Preferred Experience & Qualifications:

  • Relevant cybersecurity certifications such as CISM, CISSP, or equivalent.

Company

Bottom Line

Bottom Line

Delhi, Kolkata, Mumbai
Posted on Foundit